메뉴 건너뛰기




Volumn 3, Issue 3, 2011, Pages 163-168

A threshold-based model for privacy protection in cloud computing

Author keywords

(n+1, t+1) threshold scheme; Authorization; Cloud computing; Key matrix; Privacy; Role based access control; Vector

Indexed keywords

AUTHORIZATION; KEY MATRIX; PRIVACY; ROLE-BASED ACCESS CONTROL; THRESHOLD SCHEMES;

EID: 79956221435     PISSN: 19763700     EISSN: None     Source Type: Journal    
DOI: 10.4156/aiss.vol3.issue3.20     Document Type: Article
Times cited : (8)

References (10)
  • 3
    • 79956219332 scopus 로고    scopus 로고
    • The study of data security management of database service mode
    • Du Xiao Yong, Wang Jie Ping, "The study of data security management of database service mode", Computer Science and Technology, vol. 6, no. 4, pp. 481-499, 2010.
    • (2010) Computer Science and Technology , vol.6 , Issue.4 , pp. 481-499
    • Yong, X.D.1    Ping, W.J.2
  • 4
    • 79956217984 scopus 로고    scopus 로고
    • Key escrow based on Shamir threshold scheme
    • Yang Bo, Wang Yu Min, "Key escrow based on Shamir threshold scheme", Communications security, no.4, pp.64-69, 1999.
    • (1999) Communications Security , vol.4 , pp. 64-69
    • Bo, Y.1    Min, W.Y.2
  • 5
    • 37149041953 scopus 로고    scopus 로고
    • Difference secret sharing scheme based on special access right
    • Li Bin, "Difference secret sharing scheme based on special access right", Journal of Sichuan University(Natural Science Edition), vol. 1, no. 43, pp.78-83, 2006.
    • (2006) Journal of Sichuan University(Natural Science Edition) , vol.1 , Issue.43 , pp. 78-83
    • Li, B.1
  • 6
    • 79956210157 scopus 로고    scopus 로고
    • A special (t, n) threshold scheme based on the rank of matrix
    • Ma Cheng Fen, Zhang Qing de, Wang Li, "A special (t, n) threshold scheme based on the rank of matrix", Journal of Dezhou University, vol. 24, no. 6, pp.18-20, 2008.
    • (2008) Journal of Dezhou University , vol.24 , Issue.6 , pp. 18-20
    • Fen, M.C.1    de Qing, Z.2    Li, W.3
  • 8
    • 78651538137 scopus 로고    scopus 로고
    • A* Algorithm Based Optimization for Cloud Storage
    • Ren Xun-Yi, Ma Xiao-Dong, A* Algorithm Based Optimization for Cloud Storage, JDCTA, Vol. 4, No. 8, pp. 203-208, 2010.
    • (2010) JDCTA , vol.4 , Issue.8 , pp. 203-208
    • Xun-Yi, R.1    Xiao-Dong, M.2
  • 9
    • 79952749520 scopus 로고    scopus 로고
    • Information Security of Cloud Computing for Enterprises
    • Chang-Lung Tsai, Uei-Chin Lin, Information Security of Cloud Computing for Enterprises, AISS, Vol. 3, No. 1, pp. 132-142, 2011.
    • (2011) AISS , vol.3 , Issue.1 , pp. 132-142
    • Tsai, C.-L.1    Lin, U.-C.2
  • 10
    • 78651555696 scopus 로고    scopus 로고
    • A Study on Secure Data Storage Strategy in Cloud Computing
    • Danwei Chen, Yanjun He, A Study on Secure Data Storage Strategy in Cloud Computing, JCIT, Vol. 5, No. 7, pp. 175-179, 2010.
    • (2010) JCIT , vol.5 , Issue.7 , pp. 175-179
    • Chen, D.1    He, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.