-
1
-
-
0033652039
-
The nist model for role-based access control: Towards a unified standard
-
ACM Workshop on Role Based Access Control (RBAC), Berlin, Germany, Jul. 26-27
-
Sandhu R, Ferraiolo D F, Kuhn D R. The nist model for role-based access control: Towards a unified standard. In Proc. The 5th ACM Workshop on Role Based Access Control (RBAC), Berlin, Germany, Jul. 26-27, 2000, pp.47-63.
-
(2000)
Proc. The 5th
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.F.2
Kuhn, D.R.3
-
2
-
-
67349151773
-
Towards secure dynamic collaborations with group-based RBAC model
-
Li Q, Zhang X W, Xu M W, Wu J P. Towards secure dynamic collaborations with group-based RBAC model. Computers &Security, 2009, 28(5): 260-275.
-
(2009)
Computers &Security
, vol.28
, Issue.5
, pp. 260-275
-
-
Li, Q.1
Zhang, X.W.2
Xu, M.W.3
Wu, J.P.4
-
3
-
-
28244460211
-
Secure interoper-ation in a multidomain environment employing RBAC poli-cies
-
Shafiq B, Joshi J, Bertino E, Ghafoor A. Secure interoper-ation in a multidomain environment employing RBAC poli-cies. IEEE Transactions on Knowledge and Data Engineer-ing, 2005, 17(11): 1557-1577.
-
(2005)
IEEE Transactions on Knowledge and Data Engineer-Ing
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.2
Bertino, E.3
Ghafoor, A.4
-
4
-
-
77954464328
-
Cryptographic role-based security mechanisms based on role-key hierarchy
-
Beijing, China, Apr. China, Apr. 13-16
-
Zhu Y, Ahn G J, Hu H X, Wang H X. Cryptographic role-based security mechanisms based on role-key hierarchy. In Proc. The 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, Apr. 13-16, 2010, pp.314-319.
-
(2010)
Proc. The 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 314-319
-
-
Zhu, Y.1
Ahn, G.J.2
Hu, H.X.3
Wang, H.X.4
-
5
-
-
84976752387
-
Cryptographic solution to a prob-lem of access control in a hierarchy
-
Akl S G, Taylor P D. Cryptographic solution to a prob-lem of access control in a hierarchy. ACM Transactions on Computer System, 1983, 1(3): 239-248.
-
(1983)
ACM Transactions on Computer System
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
6
-
-
0020931264
-
Cryptographic solution to a multi-level security problem
-
Santa Barbara, USA
-
Akl S G, Taylor P D. Cryptographic solution to a multi-level security problem. In Proc. Advances in Cryptology: CRYPTO, Santa Barbara, USA, 1982, pp.237-249.
-
(1982)
Proc. Advances in Cryptology: CRYPTO
, pp. 237-249
-
-
Akl, S.G.1
Taylor, P.D.2
-
7
-
-
0003657439
-
Key management for multicast: Issues and architecture
-
draft-waller-key-arch-01.txt
-
Wallner D M, Harder E G, Agee R C. Key management for multicast: Issues and architecture. Internet Draft, draft-waller-key-arch-01.txt, 1998.
-
(1998)
Internet Draft
-
-
Wallner, D.M.1
Harder, E.G.2
Agee, R.C.3
-
8
-
-
0032178082
-
Secure group communications using key graphs
-
Vancouver, Canada Sept.2-4
-
Wong C K, Gouda M, Lam S S. Secure group communications using key graphs. In Proc. The Annual Conference of the As-sociation for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM), Vancouver, Canada, Sept. 2-4, 1998, 28, pp.68-79.
-
(1998)
Proc. The Annual Conference of the As-Sociation for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM)
, vol.28
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
9
-
-
27544468365
-
Reducing receiver's storage in CS, SD and LSD broadcast encryption schemes
-
Asano T. Reducing receiver's storage in CS, SD and LSD broadcast encryption schemes. IEICE Transactions on Fun-damentals of Electronics, Communications and Computer Sciences, 2005, 88(1): 203-210.
-
(2005)
IEICE Transactions on Fun-Damentals of Electronics, Communications and Computer Sciences
, vol.88
, Issue.1
, pp. 203-210
-
-
Asano, T.1
-
10
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Santa Barbara, USA Aug. 19-23
-
Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In Proc. The 21st Annual Interna-tional Cryptology Conference (CRYPTO), Santa Barbara, USA, Aug. 19-23, 2001, pp.41-62.
-
(2001)
Proc. The 21st Annual Interna-Tional Cryptology Conference (CRYPTO)
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
11
-
-
84937435227
-
The LSD broadcast encryption scheme
-
Santa Barbara, USA Aug. 18-22
-
Halevy D, Shamir A. The LSD broadcast encryption scheme. In Proc. The 22nd International Cryptology Conference (Crypto), Santa Barbara, USA, Aug. 18-22, 2002, pp.47-60.
-
(2002)
Proc. The 22nd International Cryptology Conference (Crypto)
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
12
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Santa Barbara, USA Aug. 19-23
-
Boneh D, Franklin M. Identity-based encryption from the weil pairing. In Proc. The 21st Annual International Cryptology Conference (CRYPTO), Santa Barbara, USA, Aug. 19-23, 2001, pp.213-229.
-
(2001)
Proc. The 21st Annual International Cryptology Conference (CRYPTO)
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
77955090387
-
How to construct identity-based signatures without the key escrow problem
-
Yuen T H, Susilo W, Mu Y. How to construct identity-based signatures without the key escrow problem. International Journal of Information Security, 2010, 9(4): 297-311.
-
(2010)
International Journal of Information Security
, vol.9
, Issue.4
, pp. 297-311
-
-
Yuen, T.H.1
Susilo, W.2
Mu, Y.3
-
14
-
-
70349557354
-
Hierarchical ID based cryptogra-phy
-
Queenstown, New Zealand\ Dec. 1-5
-
Gentry C, Silverberg A. Hierarchical ID based cryptogra-phy. In Proc. The 8th International Conference on the The-ory and Application of Cryptology and Information Security (ASIACRYPT), Queenstown, New Zealand, Dec. 1-5, 2002, pp.548-566.
-
(2002)
Proc. The 8th International Conference on the The-Ory and Application of Cryptology and Information Security (ASIACRYPT)
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
15
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Tzeng W G. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 2002, 14(1): 182-188.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.G.1
-
16
-
-
24944554962
-
Fuzzy identity-based encryption
-
Aarhus, Denmark May 22-26
-
Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Aarhus, Denmark, May 22-26, 2005, pp.457-473.
-
(2005)
Proc. The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
17
-
-
34547273527
-
Attribute-based en-cryption for fine-grained access control of encrypted data
-
Alexandria, USA, Oct. 30-Nov.
-
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based en-cryption for fine-grained access control of encrypted data. In Proc. The 13th ACM Conference on Computer and Commu-nications Security (CCS), Alexandria, USA, Oct. 30-Nov. 3, 2006, pp.89-98.
-
(2006)
Proc. The 13thACM Conference on Computer and Commu-Nications Security (CCS)
, vol.3
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
18
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures. In Proc. The 14th ACM Conference on Computer and Communications Secu-rity (CCS), Alexandria, USA, Oct. 28-31, 2007, pp.195-203.
-
(2007)
Proc. The 14th ACM Conference on Computer and Communications Secu-Rity (CCS), Alexandria, USA, Oct. 28-31
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
19
-
-
38049078557
-
Multi-authority attribute based encryption
-
Amsterdam, The Netherlands Feb. 21-24
-
Chase M. Multi-authority attribute based encryption. In Proc. The 4th Theory of Cryptography Conference (TCC), Amsterdam, The Netherlands, Feb. 21-24, 2007, pp.515-534.
-
(2007)
Proc. The 4th Theory of Cryptography Conference (TCC)
, pp. 515-534
-
-
Chase, M.1
-
20
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Oakland, USA, May 20-23
-
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. 2007 IEEE Symposium on Security and Privacy (S&P), Oakland, USA, May 20-23, 2007, pp.321-334.
-
(2007)
Proc. IEEE Symposium on Security and Privacy (S&P)
, vol.2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
21
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realiza-tion
-
Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realiza-tion. Cryptology ePrint Archive, Report 2008/290, 2008, http://eprint.iacr.org/.
-
(2008)
Cryptology EPrint Archive, Report 2008
, vol.290
-
-
Waters, B.1
-
22
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Reykjavik, Iceland Jul. 7-11
-
Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In Proc. The 35th In-ternational Colloquium on Automata, Languages and Pro-gramming, Part II | Track B: Logic, Semantics, and The-ory of Programming &Track C: Security and Cryptography Foundations (ICALP(2)), Reykjavik, Iceland, Jul. 7-11, 2008, pp.579-591.
-
(2008)
Proc. The 35th In-Ternational Colloquium on Automata, Languages and Pro-Gramming, Part II, Track B: Logic, Semantics, and The-ory of Programming &Track C: Security and Cryptography Foundations (ICALP(2))
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
23
-
-
70350630621
-
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
-
Xi'an, China Apr. 13-15
-
Ibraimi L, Tang Q, Hartel P H, Jonker W. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In Proc. The 5th International Conference on In-formation Security Practice and Experience (ISPEC), Xi'an, China, Apr. 13-15, 2009, pp.1-12.
-
(2009)
Proc. The 5th International Conference on In-Formation Security Practice and Experience (ISPEC)
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.H.3
Jonker, W.4
-
24
-
-
68849097854
-
Dual-policy attribute based encryp-tion
-
Paris, France Jun. 2-5
-
Attrapadung N, Imai H. Dual-policy attribute based encryp-tion. In Proc. The 7th International Conference on Applied Cryptography and Network Security (ACNS), Paris, France, Jun. 2-5, 2009, pp.168-185.
-
(2009)
Proc. The 7th International Conference on Applied Cryptography and Network Security (ACNS)
, pp. 168-185
-
-
Attrapadung, N.1
Imai, H.2
-
26
-
-
20444479906
-
A logic-based frame-work for attribute based access control
-
Washington DC, USA, Oct. 29, 2004
-
Wang L Y, Wijesekera D, Jajodia S. A logic-based frame-work for attribute based access control. In Proc. The 2004 ACM Workshop on Formal Methods in Security Engineering (FMSE), Washington DC, USA, Oct. 29, 2004, pp.45-55.
-
(2004)
Proc. The ACM Workshop on Formal Methods in Security Engineering (FMSE)
, pp. 45-55
-
-
Wang, L.Y.1
Wijesekera, D.2
Jajodia, S.3
-
27
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
Frikken K B, Atallah M J, Li J T. Attribute-based access control with hidden policies and hidden credentials. IEEE Transaction on Computers, 2006, 55(10): 1259-1270.
-
(2006)
IEEE Transaction on Computers
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.B.1
Atallah, M.J.2
Li, J.T.3
-
28
-
-
84976759222
-
Fine-grain access control for distributed shared memory
-
Oct. 4-7
-
Schoinas I, Falsafi B, Lebeck A R, Reinhardt S K, Larus J R, Wood D A. Fine-grain access control for distributed shared memory. In Proc. The 6th International Conference on Archi-tectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, USA, Oct. 4-7, 1994, pp.297-306.
-
(1994)
Proc. The 6th International Conference on Archi-Tectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, USA
, pp. 297-306
-
-
Schoinas, I.1
Falsafi, B.2
Lebeck, A.R.3
Reinhardt, S.K.4
Larus, J.R.5
Wood, D.A.6
-
29
-
-
85001697848
-
A fine-grained access control system for xml documents
-
Damiani E, Vimercati S D C D, Paraboschi S, Samarati P. A fine-grained access control system for xml documents. ACM Transactions on Information and System Security, 2002, 5(2): 169-202.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Vimercati, S.D.C.D.2
Paraboschi, S.3
Samarati, P.4
-
30
-
-
70350676690
-
Threshold attribute-based sig-natures and their application to anonymous credential sys-tems
-
Gammarth, Tunisia Jun. 21-25
-
Shahandashti S F, Naini R S. Threshold attribute-based sig-natures and their application to anonymous credential sys-tems. In Proc. The 2nd International Conference on Cryp-tology in Africa (AFRICACRYPT), Gammarth, Tunisia, Jun. 21-25, 2009, pp.198-216.
-
(2009)
Proc. The 2nd International Conference on Cryp-Tology in Africa (AFRICACRYPT)
, pp. 198-216
-
-
Shahandashti, S.F.1
Naini, R.S.2
-
31
-
-
76549132529
-
Attribute-based signatures: Achieving attribute-privacy and collusion-resistance
-
Maji H, Prabhakaran M, Rosulek M. Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptology ePrint Archive, Report 2008/328, 2008, http://eprint.iacr.org/.
-
(2008)
Cryptology EPrint Archive, Report 2008
, vol.328
-
-
Maji, H.1
Prabhakaran, M.2
Rosulek, M.3
-
32
-
-
78650302516
-
Attribute-based signature with policy-and-endorsement mechanism
-
Wang H X, Zhu Y, Feng R Q. Attribute-based signature with policy-and-endorsement mechanism. Journal of Computer Science and Technology, 2010, 25(6): 1293-1304.
-
(2010)
Journal of Computer Science and Technology
, vol.25
, Issue.6
, pp. 1293-1304
-
-
Wang, H.X.1
Zhu, Y.2
Feng, R.Q.3
-
33
-
-
72449201970
-
Attribute-based encryption support-ing direct/indirect revocation modes
-
Cirencester, UK Dec. 15-17
-
Attrapadung N, Imai H. Attribute-based encryption support-ing direct/indirect revocation modes. In Proc. The 12th IMA International Conference on Cryptography and Coding, Cirencester, UK, Dec. 15-17, 2009, pp.278-300.
-
(2009)
Proc. The 12th IMA International Conference on Cryptography and Coding
, pp. 278-300
-
-
Attrapadung, N.1
Imai, H.2
-
34
-
-
24944562007
-
Hierarchical identity based en-cryption with constant size ciphertext
-
Aarhus, Denmark May 22-26
-
Boneh D, Boyen X, Goh E J. Hierarchical identity based en-cryption with constant size ciphertext. In Proc. The 24th Annual International Conference on the Theory and Applica-tions of Cryptographic Techniques (EUROCRYPT), Aarhus, Denmark, May 22-26, 2005, pp.440-456.
-
(2005)
Proc. The 24th Annual International Conference on the Theory and Applica-Tions of Cryptographic Techniques (EUROCRYPT)
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
35
-
-
33745166648
-
Collusion resistant broad-cast encryption with short ciphertexts and private keys
-
Santa Barbara, USA Aug. 14-18
-
Boneh D, Gentry C, Waters B. Collusion resistant broad-cast encryption with short ciphertexts and private keys. In Proc. The 25th Annual International Cryptology Conference (CRYPTO), Santa Barbara, USA, Aug. 14-18, 2005, pp.258-275.
-
(2005)
Proc. The 25th Annual International Cryptology Conference (CRYPTO)
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
36
-
-
70350413818
-
Towards trustworthy delega-tion in role-based access control model
-
Pisa, Italy Sept. 7-9
-
Toahchoodee M, Xie X, Ray I. Towards trustworthy delega-tion in role-based access control model. In Proc. The 12th In-ternational Conference on Information Security (ISC), Pisa, Italy, Sept. 7-9, 2009, pp.379-394.
-
(2009)
Proc. The 12th In-Ternational Conference on Information Security (ISC)
, pp. 379-394
-
-
Toahchoodee, M.1
Xie, X.2
Ray, I.3
-
37
-
-
84864163960
-
Microsoft Corporation. How encrypting file system works
-
Microsoft Corporation. How encrypting file system works. Microsoft TechNet Report, 2009, http://technet.mi-crosoft.com/en-us/library/cc781588(WS. 10).aspx.
-
(2009)
Microsoft TechNet Report
-
-
-
40
-
-
77649253310
-
A new hard-core predicate of paillier's trap-door function
-
New Delhi, India Dec. 13-16
-
Su D, Lv K W. A new hard-core predicate of paillier's trap-door function. In Proc. The 10th International Conference on Cryptology in India (INDOCRYPT), New Delhi, India, Dec. 13-16, 2009, pp.263-271.
-
(2009)
Proc. The 10th International Conference on Cryptology in India (INDOCRYPT)
, pp. 263-271
-
-
Su, D.1
Lv, K.W.2
-
41
-
-
0742303115
-
Windows 2000 security: A postmortem analysis
-
Schultz E E. Windows 2000 security: A postmortem analysis. Network Security, 2004, 2004(1): 6-9.
-
Network Security
, vol.2004
, Issue.1
, pp. 6-9
-
-
Schultz, E.E.1
|