메뉴 건너뛰기




Volumn 23, Issue 12, 2011, Pages 1443-1464

Achieving fine-grained access control for secure data sharing on cloud servers

Author keywords

cloud computing; precise and fuzzy identity based encryption; secure storage

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; DATA SHARING; DIGITAL STORAGE;

EID: 80051514746     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.1698     Document Type: Article
Times cited : (48)

References (27)
  • 2
    • 84979291225 scopus 로고
    • Broadcast encryption
    • (Lecture Notes in Computer Science, 773), Santa Barbara, CA, U.S.A.
    • Fiat A, Naor M,. Broadcast encryption. Proceedings of CRYPTO '93 (Lecture Notes in Computer Science, vol. 773), Santa Barbara, CA, U.S.A., 1993; 480-491.
    • (1993) Proceedings of CRYPTO , vol.93 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh D, Franklin M,. Identity-based encryption from the weil pairing. Proceedings of CRYPTO '01 (Lecture Notes in Computer Science, vol. 2139), Santa Barbara, CA, U.S.A., 2001; 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • (Lecture Notes in Computer Science, 2332), Amsterdam, The Netherlands.
    • Horwitz J, Lynn B,. Toward hierarchical identity-based encryption. Proceedings of EUROCRYPT '02 (Lecture Notes in Computer Science, vol. 2332), Amsterdam, The Netherlands, 2002; 466-481.
    • (2002) Proceedings of EUROCRYPT '02 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 11
  • 12
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boneh D, Boyen X, Goh E,. Hierarchical identity based encryption with constant size ciphertext. Proceedings of EUROCRYPT '05 (Lecture Notes in Computer Science, vol. 3494), Aarhus, Denmark, 2005; 440-456. (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 13
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Santa Barbara, CA, U.S.A
    • Waters B,. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. Proceedings of CRYPTO '09 (Lecture Notes in Computer Science, vol. 5677), Santa Barbara, CA, U.S.A., 2009; 619-636.
    • (2009) Proceedings of CRYPTO '09 (Lecture Notes in Computer Science, 5677) , pp. 619-636
    • Waters, B.1
  • 15
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Sahai A, Waters B,. Fuzzy identity-based encryption. Proceedings of EUROCRYPT '05 (Lecture Notes in Computer Science, vol. 3494), Aarhus, Denmark, 2005; 457-473. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 16
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • Alexandria, VA, U.S.A
    • Ostrovsky R, Sahai A, Waters B,. Attribute-based encryption with non-monotonic access structures. Proceedings of ACM CCS '07, Alexandria, VA, U.S.A., 2007; 195-203.
    • (2007) Proceedings of ACM CCS '07 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 17
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • Bethencourt J, Sahai A, Waters B,. Ciphertext-policy attribute-based encryption. Proceedings of ISSP '07, Kanazawa, Japan, 2007; 321-334. (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 19
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • (Lecture Notes in Computer Science, 4392), Amsterdam, The Netherlands.
    • Chase M,. Multi-authority attribute based encryption. Proceedings of TCC '07 (Lecture Notes in Computer Science, vol. 4392), Amsterdam, The Netherlands, 2007; 515-534.
    • (2007) Proceedings of TCC '07 , pp. 515-534
    • Chase, M.1
  • 20
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • Chicago, IL, U.S.A
    • Chase M, Chow S,. Improving privacy and security in multi-authority attribute-based encryption. Proceedings of ACM CCS '09, Chicago, IL, U.S.A., 2009; 121-130.
    • (2009) Proceedings of ACM CCS '09 , pp. 121-130
    • Chase, M.1    Chow, S.2
  • 21
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • San Diego, CA, U.S.A
    • Yu S, Wang C, Ren K, Lou W,. Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of INFOCOM '10, San Diego, CA, U.S.A., 2010; 534-542.
    • (2010) Proceedings of INFOCOM '10 , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 23
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze M, Bleumer G, Strauss M,. Divertible protocols and atomic proxy cryptography. Proceedings of EUROCRYPT '98, Espoo, Finland, 1998; 127-144. (Pubitemid 128081481)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 24
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • Espoo, Finland, 2010, P&D session
    • Wang G, Liu Q, Wu J,. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. Proceedings of ACM CCS '10, Espoo, Finland, 2010, P&D session; 735-737.
    • Proceedings of ACM CCS '10 , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 25
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • Beijing, China
    • Yu S, Wang C, Ren K,. Attribute based data sharing with attribute revocation. Proceedings of ASIACCS '10, Beijing, China, 2010; 261-270.
    • (2010) Proceedings of ASIACCS '10 , pp. 261-270
    • Yu, S.1    Wang, C.2    Ren, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.