-
1
-
-
36248929860
-
Hierarchybased access control in distributed environments
-
In, Finland, USA, June
-
J. Birget, X. Zou, G. Noubir, and B. Ramamurthy. Hierarchybased access control in distributed environments. In Proc. of IEEE InternationalConference on Communications, Finland, USA, June 2002.
-
(2002)
Proc. of IEEE InternationalConference on Communications
-
-
Birget, J.1
Zou, X.2
Noubir, G.3
Ramamurthy, B.4
-
2
-
-
85009120801
-
Controlling access to published data using cryptography
-
In, Berlin, Germany, Sept
-
G. Miklau, D. Suciu. Controlling access to published data using cryptography. In Proc. of the 29th VLDB conference, Berlin, Germany, Sept. 2003.
-
(2003)
Proc. of the 29th VLDB conference
-
-
Miklau, G.1
Suciu, D.2
-
3
-
-
8344221947
-
Scalable hierarchical access control in secure group communications
-
In, Hong Kong, China, March
-
Y. Sun, K. Liu. Scalable hierarchical access control in secure group communications. In Proc. of the IEEE Infocom, Hong Kong, China, March 2004.
-
(2004)
Proc. of the IEEE Infocom
-
-
Sun, Y.1
Liu, K.2
-
6
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
In
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: Management of access control evolution on outsourced data. In VLDB, 2007.
-
(2007)
VLDB
-
-
de Capitani di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
79961157478
-
Dynamic Group Key Management in Outsourced Databases
-
San Francisco, USA, October, 24-26
-
A. Lanovenko, H. Guo. Dynamic Group Key Management in Outsourced Databases. Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA, October, 24-26,2007, pp.22-28.
-
(2007)
Proceedings of the World Congress on Engineering and Computer Science
, pp. 22-28
-
-
Lanovenko, A.1
Guo, H.2
-
8
-
-
58049164962
-
Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing
-
Tangier, Morocco, November,5-7
-
S Liu., W. Li, L.Y. Wang. Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. New Technologies, Mobilety and Security, Tangier, Morocco, November,5-7, 2008, pp.1-5.
-
(2008)
New Technologies, Mobilety and Security
, pp. 1-5
-
-
Liu, S.1
Li, W.2
Wang, L.Y.3
-
9
-
-
77950819846
-
Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
-
J. Weng, M.R. Chen, K.F. Chen, R.H. Deng. Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. IEICE Transaction. 2010,94-A(4): 854-856.
-
(2010)
IEICE Transaction
, vol.94 A
, Issue.4
, pp. 854-856
-
-
Weng, J.1
Chen, M.R.2
Chen, K.F.3
Deng, R.H.4
-
10
-
-
74049154660
-
Secure and efficient access to outsourced data
-
Chicago, USA, November 9-13
-
W. Wang, Z.W. Li, R. Owens, B. Bhargava. Secure and efficient access to outsourced data. Proceedings of the 2009 ACM workshop on Cloud computing security, Chicago, USA, November 9-13,2009, pp.55-56.
-
(2009)
Proceedings of the 2009 ACM workshop on Cloud computing security
, pp. 55-56
-
-
Wang, W.1
Li, Z.W.2
Owens, R.3
Bhargava, B.4
-
11
-
-
77954491603
-
A PKI-based mechanism for secure and efficient access to outsourced data
-
St. Maarten, Netherlands Antilles, February, 10-16
-
J. Dai, Q. Zhou. A PKI-based mechanism for secure and efficient access to outsourced data. Networking and digital society(ICNDS), St. Maarten, Netherlands Antilles, February, 10-16, 2010, pp. 640-643.
-
(2010)
Networking and digital society(ICNDS)
, pp. 640-643
-
-
Dai, J.1
Zhou, Q.2
|