-
1
-
-
79956335469
-
-
Amazon simple storage service amazon s3
-
Amazon simple storage service (amazon s3), http://aws.amazon.com/s3/
-
-
-
-
2
-
-
79956327882
-
-
Microsoft's azure storage service
-
Microsoft's azure storage service, http://www.microsoft.com/windowsazure/ windowsazure/
-
-
-
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society, los Alamitos (2007) (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
Al-Shaer, E., Jha, S., Keromytis, A. D. eds., ACM, New York
-
Chase, M., Chow, S. S. M.: Improving privacy and security in multi-authority attribute-based encryption. In: Al-Shaer, E., Jha, S., Keromytis, A. D. (eds.) ACM Conference on Computer and Communications Security, pp. 121-130. ACM, New York (2009)
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.M.2
-
5
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
Atluri, V. ed., Springer, Heidelberg
-
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 127-143. Springer, Heidelberg (2008)
-
(2008)
DAS 2008. LNCS
, vol.5094
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
6
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
Goh, E. J., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: NDSS. The Internet Society, San Diego (2003)
-
(2003)
NDSS. the Internet Society, San Diego
-
-
Goh, E.J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
7
-
-
84878346477
-
Supporting publication and subscription confidentiality in pub/sub networks
-
Ion, M., Russello, G., Crispo, B.: Supporting publication and subscription confidentiality in pub/sub networks. In: The 6th International ICST Conference on Security and Privacy in Communication Networks, pp. 272-289 (2010)
-
(2010)
The 6th International ICST Conference on Security and Privacy in Communication Networks
, pp. 272-289
-
-
Ion, M.1
Russello, G.2
Crispo, B.3
-
8
-
-
33244454312
-
Securing distributed storage: Challenges, techniques, and systems
-
DOI 10.1145/1103780.1103783, StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
-
Kher, V., Kim, Y.: Securing distributed storage: challenges, techniques, and systems. In: Atluri, V., Samarati, P., Yurcik, W., Brumbaugh, L., Zhou, Y. (eds.) StorageSS, pp. 9-25. ACM, New York (2005) (Pubitemid 43275368)
-
(2005)
StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
, pp. 9-25
-
-
Kher, V.1
Kim, Y.2
-
9
-
-
84864536476
-
Decentralizing attribute-based encryption
-
to appear
-
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Eurocrypt (to appear, 2011), http://eprint.iacr.org/2010/351
-
(2011)
Eurocrypt
-
-
Lewko, A.1
Waters, B.2
-
10
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
Jajodia, S., Zhou, J. eds., Springer, Heidelberg
-
Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 50, pp. 89-106. Springer, Heidelberg (2010)
-
(2010)
SecureComm 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.50
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
11
-
-
79951783454
-
Attribute-based signatures
-
Kiayias, A. ed., Springer, Heidelberg
-
Maji, H. K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376-392. Springer, Heidelberg (2011)
-
(2011)
CT-RSA 2011. LNCS
, vol.6558
, pp. 376-392
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
13
-
-
52649147450
-
Sharoes: A data sharing platform for outsourced enterprise storage environments
-
IEEE, los Alamitos
-
Singh, A., Liu, L.: Sharoes: A data sharing platform for outsourced enterprise storage environments. In: ICDE, pp. 993-1002. IEEE, los Alamitos (2008)
-
(2008)
ICDE
, pp. 993-1002
-
-
Singh, A.1
Liu, L.2
-
15
-
-
74049154660
-
Secure and efficient access to outsourced data
-
Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: CCSW, pp. 55-65 (2009)
-
(2009)
CCSW
, pp. 55-65
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
|