-
1
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
M. Atallah, K. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In Proc. CCS'05, Alexandria, USA, Nov. 2005.
-
Proc. CCS'05, Alexandria, USA, Nov. 2005
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
2
-
-
34547282859
-
Provably-secure time-bound hierarchical key assignment schemes
-
G. Ateniese, A. De Santis, A.L. Ferrara, and B. Masucci. Provably-secure time-bound hierarchical key assignment schemes. In Proc. CCS'06, Alexandria, USA, Oct. 2006.
-
Proc. CCS'06, Alexandria, USA, Oct. 2006
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
3
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proc. CCS'09, Chicago, USA, Nov. 2009.
-
Proc. CCS'09, Chicago, USA, Nov. 2009
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
4
-
-
70349253957
-
Preserving confidentiality of security policies in data outsourcing
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati. Preserving confidentiality of security policies in data outsourcing. In Proc. WPES'08, Alexandria, USA, Oct. 2008.
-
Proc. WPES'08, Alexandria, USA, Oct. 2008
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
5
-
-
77952046953
-
Encryption Policies for Regulating Access to Outsourced Data
-
to appear
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Encryption Policies for Regulating Access to Outsourced Data. ACM TODS, 2010 (to appear).
-
(2010)
ACM TODS
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
6
-
-
85084161366
-
TOR: The second-generation onion router
-
R. Dingledine, N. Mathewson, and P. Syverson. TOR: the second-generation onion router. In Proc. USENIX Security'04, Berkeley, USA, Aug. 2004.
-
Proc. USENIX Security'04, Berkeley, USA, Aug. 2004
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
7
-
-
0036204131
-
Providing database as a service
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. ICDE'02, San Jose, USA, Feb. 2002.
-
Proc. ICDE'02, San Jose, USA, Feb. 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
9
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
DOI 10.1145/1149976.1149977
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. ACM TOS, 2(2):107-138, May 2006. (Pubitemid 44232391)
-
(2006)
ACM Transactions on Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
10
-
-
2642549675
-
Cryptosystems based on pairing
-
R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. In Proc. SCIS'00, Okinawa, Japan, Jan. 2000.
-
Proc. SCIS'00, Okinawa, Japan, Jan. 2000
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
|