메뉴 건너뛰기




Volumn 9, Issue 8, 2010, Pages 1598-1606

A hierarchical access control scheme in cloud using HHECC

Author keywords

Access control; Advance encryption standard; Elliptic curve crytopgraphy; One way hash; Relationship graph

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; EFFICIENCY; GEOMETRY; HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY;

EID: 78651351023     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2010.1598.1606     Document Type: Article
Times cited : (9)

References (24)
  • 2
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Boneh, D., X. Boyen and E. Goh, 2005. Hierarchical identity based encryption with constant size ciphertext. Lecture Notes Comput. Sci., 3494: 440-456.
    • (2005) Lecture Notes Comput. Sci. , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 4
    • 0028483923 scopus 로고
    • Locality-preserving hash functions for general purpose parallel computation
    • Chin, A., 1994. Locality-preserving hash functions for general purpose parallel computation. Algorithmic, 12: 170-181.
    • (1994) Algorithmic , vol.12 , pp. 170-181
    • Chin, A.1
  • 5
    • 70350525055 scopus 로고    scopus 로고
    • A reliable architecture for parallel implementations of the advanced encryption standard
    • Di Natale, G., M. Doulcier, M.L. Flottes and B. Rouzeyre, 2009. A reliable architecture for parallel implementations of the advanced encryption standard. J. Electr. Testing, 25: 269-278.
    • (2009) J. Electr. Testing , vol.25 , pp. 269-278
    • Di Natale, G.1    Doulcier, M.2    Flottes, M.L.3    Rouzeyre, B.4
  • 9
    • 71749101660 scopus 로고    scopus 로고
    • Towards an approach of semantic access control for cloud computing
    • Hu, L., S. Ying, X. Jia and K. Zhao, 2009. Towards an approach of semantic access control for cloud computing. Lecture Notes Comput. Sci., 5931: 145-156.
    • (2009) Lecture Notes Comput. Sci. , vol.5931 , pp. 145-156
    • Hu, L.1    Ying, S.2    Jia, X.3    Zhao, K.4
  • 16
    • 0001637933 scopus 로고
    • A monte carlo method for factorization
    • Pollard, M.J., 1975. A monte carlo method for factorization. BIT Numerical Math., 15: 331-334.
    • (1975) BIT Numerical Math. , vol.15 , pp. 331-334
    • Pollard, M.J.1
  • 17
    • 84966238549 scopus 로고
    • Monte carlo methods of index computation (mod p)
    • Pollard, J.M., 1978. Monte carlo methods of index computation (mod p). Math. Comput, 32: 918-924.
    • (1978) Math. Comput. , vol.32 , pp. 918-924
    • Pollard, J.M.1
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L.,A. Shamir and L. Adleman, 1978. Amethod for obtaining digital signatures and public-key cryptosystems. ACM Commun, 21: 120-126.
    • (1978) ACM Commun. , vol.21 , pp. 120-126
  • 19
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sandhu, R.S. and P. Samarati, 1994. Access control: Principles and practice. IEEE Commun. Magazine, 32: 40-48.
    • (1994) IEEE Commun. Magazine , vol.32 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 21
    • 78651350725 scopus 로고    scopus 로고
    • The Apache Software Foundation, The Apache Software Foundation
    • The Apache Software Foundation, 2009. The hadoop distributed file system architecture. The Apache Software Foundation.
    • (2009) The hadoop distributed file system architecture
  • 22
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • Tolone, W., G. Ahn, T. Pai and S. Hong, 2005. Access control in collaborative systems. ACM Comput. Surv., 37: 29-41.
    • (2005) ACM Comput. Surv. , vol.37 , pp. 29-41
    • Tolone, W.1    Ahn, G.2    Pai, T.3    Hong, S.4
  • 24
    • 85017313616 scopus 로고    scopus 로고
    • Cloud computing-issues research and implementations
    • Vouk, M.A., 2008. Cloud computing-issues, research and implementations. J. Comput. Inform. Technol., 4: 235-246.
    • (2008) J. Comput. Inform. Technol. , vol.4 , pp. 235-246
    • Vouk, M.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.