메뉴 건너뛰기




Volumn , Issue , 2007, Pages 63-69

A data outsourcing architecture combining cryptography and access control

Author keywords

Access control; Cryptography; Outsourced architecture

Indexed keywords

AUTHORIZATION; OUTSOURCING;

EID: 70349303408     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314466.1314477     Document Type: Conference Paper
Times cited : (99)

References (19)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • August
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM TOCS, 1(3):239-248, August 1983.
    • (1983) ACM TOCS , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 4
    • 33745793594 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • Alexandria, VA, USA, November
    • M. Atallah, K. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In Proc. of the 12th ACM CCS05, Alexandria, VA, USA, November 2005.
    • (2005) Proc. of the 12th ACM CCS05
    • Atallah, M.1    Frikken, K.2    Blanton, M.3
  • 5
    • 85129109910 scopus 로고    scopus 로고
    • Chip-secured data access: Reconciling access rights with data encryption
    • Berlin, Germany, September
    • L. Bouganim, F. D. Ngoc, P. Pucheral, and L. Wu. Chip-secured data access: Reconciling access rights with data encryption. In Proc. of the 29th VLDB Conference, Berlin, Germany, September 2003.
    • (2003) Proc. of the 29th VLDB Conference
    • Bouganim, L.1    Ngoc, F.D.2    Pucheral, P.3    Wu, L.4
  • 12
  • 14
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, Wisconsin, USA, June
    • H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD 2002, Madison, Wisconsin, USA, June 2002.
    • (2002) Proc. of the ACM SIGMOD 2002
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 15
    • 0242625197 scopus 로고    scopus 로고
    • Cryptographic access control in a distributed file system
    • Como, Italy, June
    • A. Harrington and C. Jensen. Cryptographic access control in a distributed file system. In Proc. of the 8th SACMAT, Como, Italy, June 2003.
    • (2003) Proc. of the 8th SACMAT
    • Harrington, A.1    Jensen, C.2
  • 17
    • 85128992094 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Berlin, Germany, September
    • G. Miklau and D. Suciu. Controlling access to published data using cryptography. In Proc. of the 29th VLDB Conference, Berlin, Germany, September 2003.
    • (2003) Proc. of the 29th VLDB Conference
    • Miklau, G.1    Suciu, D.2
  • 19
    • 19944423977 scopus 로고
    • The protection of information in computer systems
    • July
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Saltzer, J.1    Schroeder, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.