메뉴 건너뛰기




Volumn , Issue , 2008, Pages 39-44

Attribute-based content distribution with hidden policy

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; DISTRIBUTED PARAMETER NETWORKS; DISTRIBUTION OF GOODS; INTERNET; NETWORK PROTOCOLS; SECURITY SYSTEMS; TECHNICAL PRESENTATIONS;

EID: 58049192731     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NPSEC.2008.4664879     Document Type: Conference Paper
Times cited : (71)

References (12)
  • 1
    • 58049200647 scopus 로고    scopus 로고
    • MU, Existing cdns. [Online]. Available: http://www.cs.mu.oz. au/apathan/CDNs.html
    • MU, "Existing cdns." [Online]. Available: http://www.cs.mu.oz. au/apathan/CDNs.html
  • 2
    • 0004200684 scopus 로고
    • Computer security planning study,
    • Technical Report 73-51, Air Force Electronic System Division
    • J.P.Anderson, "Computer security planning study," Technical Report 73-51, Air Force Electronic System Division, 1972.
    • (1972)
    • Anderson, J.P.1
  • 3
    • 4544290272 scopus 로고    scopus 로고
    • Plutus: Scalable secure file sharing on untrusted storage
    • San Francisco, CA, Dec
    • M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in USENIX'02, San Francisco, CA, Dec. 2002.
    • (2002) USENIX'02
    • Kallahalla, M.1    Riedel, E.2    Swaminathan, R.3    Wang, Q.4    Fu, K.5
  • 4
    • 0242625197 scopus 로고    scopus 로고
    • Cryptographic access control in a distributed file system
    • New York, NY, USA: ACM
    • A. Harrington and C. Jensen, "Cryptographic access control in a distributed file system," in SACMAT '03. New York, NY, USA: ACM, 2003, pp. 158-165.
    • (2003) SACMAT '03 , pp. 158-165
    • Harrington, A.1    Jensen, C.2
  • 5
    • 58049191379 scopus 로고    scopus 로고
    • K. Fu, Integrity and access control in untrusted content distribution networks, Ph.D. dissertation, MIT, September 2005. [Online]. Available: http://prisms.cs.umass.edu/ kevinfu/papers/fu-phd-thesis.pdf
    • K. Fu, "Integrity and access control in untrusted content distribution networks," Ph.D. dissertation, MIT, September 2005. [Online]. Available: http://prisms.cs.umass.edu/ kevinfu/papers/fu-phd-thesis.pdf
  • 7
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy abe
    • New York, NY, USA: ACM
    • L. Cheung and C. Newport, "Provably secure ciphertext policy abe," in CCS '07. New York, NY, USA: ACM, 2007, pp. 456-465.
    • (2007) CCS '07 , pp. 456-465
    • Cheung, L.1    Newport, C.2
  • 8
    • 35248851617 scopus 로고    scopus 로고
    • Correlation-resistant storage via keyword-searchable encryption
    • Cryptology ePrint Archive, Report 2005/417, Nov
    • L. Ballard, M. Green, B. de Medeiros, and F. Monrose, "Correlation-resistant storage via keyword-searchable encryption," Cryptology ePrint Archive, Report 2005/417, Nov. 2005, http://eprint.iacr.org/ 2005/417.
    • (2005)
    • Ballard, L.1    Green, M.2    de Medeiros, B.3    Monrose, F.4
  • 9
    • 70349086608 scopus 로고    scopus 로고
    • Attribute-based on-demand multicast group setup with membership anonymity
    • Istanbul, Turkey, Sep
    • S. Yu, K. Ren, and W. Lou, "Attribute-based on-demand multicast group setup with membership anonymity," in SecureComm'08, Istanbul, Turkey, Sep. 2008.
    • (2008) SecureComm'08
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 10
    • 58049200643 scopus 로고    scopus 로고
    • Collusion- resistant group key management using attribute-based encryption
    • Cryptology ePrint Archive, Report 2007/161
    • L. Cheung, J. A. Cooley, R. Khazan, and C. Newport, "Collusion- resistant group key management using attribute-based encryption," Cryptology ePrint Archive, Report 2007/161, 2007, http://eprint.iacr.org/.
    • (2007)
    • Cheung, L.1    Cooley, J.A.2    Khazan, R.3    Newport, C.4
  • 11
    • 85180804257 scopus 로고    scopus 로고
    • Realizing massive-scale conditional access systems through attribute-based cryptosystems
    • San Diego, CA
    • P. Traynor, K. Butler, W. Enck, and P. McDaniel, "Realizing massive-scale conditional access systems through attribute-based cryptosystems," in NDSS'08, San Diego, CA, 2008.
    • (2008) NDSS'08
    • Traynor, P.1    Butler, K.2    Enck, W.3    McDaniel, P.4
  • 12
    • 34547325357 scopus 로고    scopus 로고
    • Secure attribute-based systems
    • Alexandria, VA, Oct-Nov
    • M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems," in CCS'06, Alexandria, VA, Oct-Nov. 2006.
    • (2006) CCS'06
    • Pirretti, M.1    Traynor, P.2    McDaniel, P.3    Waters, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.