메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Achieving secure, scalable, and fine-grained data access control in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS POLICIES; AUTHORIZED USERS; CLOUD COMPUTING; COMBINING TECHNIQUES; COMPUTATION OVERHEADS; COMPUTING INFRASTRUCTURES; CRYPTOGRAPHIC METHODS; DATA ACCESS CONTROL; DATA ATTRIBUTES; DATA CONFIDENTIALITY; DATA CONTENTS; DATA MANAGEMENT; DATA SECURITY; DECRYPTION KEYS; EMERGING COMPUTING PARADIGM; KEY DISTRIBUTION; OUTSOURCE; PROVABLY SECURE; RE-ENCRYPTION; SECRET KEY; SECURITY MODEL; SENSITIVE DATAS; UNTRUSTED SERVER; USER ACCESS; USER DATA;

EID: 77953310709     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462174     Document Type: Conference Paper
Times cited : (1345)

References (22)
  • 2
    • 77953319704 scopus 로고    scopus 로고
    • Online at
    • Amazon Web Services (AWS), Online at http://aws. amazon.com.
  • 3
    • 77957936026 scopus 로고    scopus 로고
    • Online at
    • Google App Engine, Online at http://code.google.com/appengine/.
    • Google App Engine
  • 4
    • 77953302523 scopus 로고    scopus 로고
    • Microsoft Azure, http://www.microsoft.com/azure/.
  • 7
    • 77953306664 scopus 로고    scopus 로고
    • Methods and limitations of security policy reconciliation
    • P. D. McDaniel and A. Prakash, "Methods and limitations of security policy reconciliation," in Proc. of SP'02, 2002.
    • Proc. of SP'02, 2002
    • McDaniel, P.D.1    Prakash, A.2
  • 8
    • 77953309871 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • T. Yu and M. Winslett, "A unified scheme for resource protection in automated trust negotiation," in Proc. of SP'03, 2003.
    • Proc. of SP'03, 2003
    • Yu, T.1    Winslett, M.2
  • 10
    • 0004200684 scopus 로고
    • Air Force Electronic Systems Division, Report ESD-TR-73-51
    • J. Anderson, "Computer Security Technology Planning Study," Air Force Electronic Systems Division, Report ESD-TR-73-51, 1972, http://seclab.cs.ucdavis.edu/projects/history/.
    • (1972) Computer Security Technology Planning Study
    • Anderson, J.1
  • 13
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," in Proc. of NDSS'05, 2005.
    • Proc. of NDSS'05, 2005
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 15
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of CCS'06, 2006.
    • Proc. of CCS'06, 2006
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 17
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proc. of ESORICS '09, 2009.
    • Proc. of ESORICS '09, 2009
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 19
    • 84908526195 scopus 로고    scopus 로고
    • Defending against key abuse attacks in kp-abe enabled broadcast systems
    • S. Yu, K. Ren, W. Lou, and J. Li, "Defending against key abuse attacks in kp-abe enabled broadcast systems," in Proc. of SECURECOMM'09, 2009.
    • Proc. of SECURECOMM'09, 2009
    • Yu, S.1    Ren, K.2    Lou, W.3    Li, J.4
  • 20
    • 77953296239 scopus 로고    scopus 로고
    • The optimality of a fast CNF conversion and its use with SAT
    • D. Sheridan, "The optimality of a fast CNF conversion and its use with SAT," in Proc. of SAT'04, 2004.
    • Proc. of SAT'04, 2004
    • Sheridan, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.