메뉴 건너뛰기




Volumn , Issue , 2011, Pages 41-50

OAuth and ABE based authorization in semi-trusted cloud computing

Author keywords

Access control; Authorization; Cloud computing

Indexed keywords

APPLICATION PROVIDERS; AUTHORIZATION; CLOUD PROVIDERS; CLOUD SERVICES; COMPUTATION POWER; CONTROL STANDARDS; CRYPTOGRAPHIC FUNCTIONS; ENCRYPTION SCHEMES; END USERS; END-TO-END ENCRYPTION; EXTENSIVE SIMULATIONS; HTTP PROTOCOLS; POLICY ENFORCEMENT; SECURITY ANALYSIS; SECURITY LEVEL; SENSITIVE INFORMATIONS; USER-CENTRIC;

EID: 84856318184     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2087522.2087531     Document Type: Conference Paper
Times cited : (30)

References (14)
  • 2
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • M. Blaze, G. Bleumer, and M. Strauss, Divertible protocol and atomic proxy cryptography, In Proceedings of EUROCRYPT'98, vol. 1402, pp. 127-144, 1998. (Pubitemid 128081481)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 3
    • 74049136395 scopus 로고    scopus 로고
    • Proof of retrievability: Theory and implementation
    • K. D. Bowers, A. Juels and A. Opera, Proof of Retrievability: Theory and Implementation, In ACM CCSW 2009, 2009.
    • (2009) ACM CCSW 2009
    • Bowers, K.D.1    Juels, A.2    Opera, A.3
  • 4
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: A high-availability and integrity layer for cloud storage
    • K. D. Bowers, A. Juels and A. Opera, HAIL: A High-Availability and Integrity Layer for cloud Storage, In ACM CCS 2009, 2009.
    • (2009) ACM CCS 2009
    • Bowers, K.D.1    Juels, A.2    Opera, A.3
  • 9
    • 41949093741 scopus 로고    scopus 로고
    • specs@openid.net, December
    • specs@openid.net, The OpenID Authentication 2.0-Final http://openid.net/specs/openid-authentication-20.html, December 2007.
    • (2007) The OpenID Authentication 2.0-Final
  • 10
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • vol 6571 of LNCS, Springer
    • B. Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, In Public Key Cryptography|PKC, vol 6571 of LNCS, pp. 53-70, Springer, 2011.
    • (2011) Public Key Cryptography|PKC , pp. 53-70
    • Waters, B.1
  • 12
    • 77953310709 scopus 로고    scopus 로고
    • Acieveing secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, Acieveing Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, In Proceceeding of IEEE INFOCOM'10, pp. 534-542, 2010.
    • (2010) Proceceeding of IEEE INFOCOM'10 , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 13
    • 74049138993 scopus 로고    scopus 로고
    • On protecting integrity and confidentiality of cryptographic file system for outsource storage
    • A. Yun, C. Shi and Y. Kim, On Protecting Integrity and Confidentiality of Cryptographic File System for Outsource Storage, In ACM CCSW 2009, 2009.
    • (2009) ACM CCSW 2009
    • Yun, A.1    Shi, C.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.