-
1
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
ACM New York, NY, USA
-
M.J. Atallah, K.B. Frikken, and M. Blanton Dynamic and efficient key management for access hierarchies Proceedings of the 12th ACM conference on computer and communications security, CCS 05 2005 ACM New York, NY, USA 190 202
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 05
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
3
-
-
78649858433
-
Efficient key management for enforcing access control in outsourced scenarios
-
D. Gritzalis, J. Lopez, Springer Boston
-
C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, and S. Paraboschi Efficient key management for enforcing access control in outsourced scenarios D. Gritzalis, J. Lopez, Emerging challenges for security, privacy and trust, IFIP advances in information and communication technology 297 2009 Springer Boston 364 375
-
(2009)
Emerging Challenges for Security, Privacy and Trust, IFIP Advances in Information and Communication Technology
, vol.297
, pp. 364-375
-
-
Blundo, C.1
Cimato, S.2
De Capitani Di Vimercati, S.3
De Santis, A.4
Foresti, S.5
Paraboschi, S.6
-
4
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSS
-
ACM New York, NY, USA
-
E. Damiani, S.D.C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati Balancing confidentiality and efficiency in untrusted relational DBMSS Proceedings of the 10th ACM conference on computer and communications security, CCS 03 2003 ACM New York, NY, USA 93 102
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 03
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
33244469997
-
Key management for multi-user encrypted databases
-
ACM New York, NY, USA
-
E. Damiani, S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Key management for multi-user encrypted databases Proceedings of the 2005 ACM workshop on storage security and survivability, StorageSS 05 2005 ACM New York, NY, USA 74 83
-
(2005)
Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, StorageSS 05
, pp. 74-83
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
36248981396
-
An experimental evaluation of multi-key strategies for data outsourcing
-
H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. von Solms, Springer Boston
-
E. Damiani, S. De Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati An experimental evaluation of multi-key strategies for data outsourcing H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. von Solms, New approaches for security, privacy and trust in complex environments, IFIP international federation for information processing vol. 232 2007 Springer Boston 385 396
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments, IFIP International Federation for Information Processing
, vol.232
, pp. 385-396
-
-
Damiani, E.1
De Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
70349253957
-
Preserving confidentiality of security policies in data outsourcing
-
ACM New York, NY, USA
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati Preserving confidentiality of security policies in data outsourcing Proceedings of the seventh ACM workshop on privacy in the electronic society, WPES 08 2008 ACM New York, NY, USA 75 84
-
(2008)
Proceedings of the Seventh ACM Workshop on Privacy in the Electronic Society, WPES 08
, pp. 75-84
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
8
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd international conference on very large data bases, VLDB 07, VLDB Endowment 2007 123 134
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 07, VLDB Endowment
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
ACM New York, NY, USA
-
S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati A data outsourcing architecture combining cryptography and access control Proceedings of the 2007 ACM workshop on computer security architecture, CSAW 07 2007 ACM New York, NY, USA 63 69
-
(2007)
Proceedings of the 2007 ACM Workshop on Computer Security Architecture, CSAW 07
, pp. 63-69
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
77956137294
-
Cryptographic cloud storage
-
R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, Springer Berlin/Heidelberg
-
S. Kamara, and K. Lauter Cryptographic cloud storage R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, Financial cryptography and data security, lecture notes in computer science vol. 6054 2010 Springer Berlin/Heidelberg 136 149
-
(2010)
Financial Cryptography and Data Security, Lecture Notes in Computer Science
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
12
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
ACM New York, NY, USA
-
Y. Kim, A. Perrig, and G. Tsudik Simple and fault-tolerant key agreement for dynamic collaborative groups Proceedings of the seventh ACM conference on computer and communications security, CCS 00 2000 ACM New York, NY, USA 235 244
-
(2000)
Proceedings of the Seventh ACM Conference on Computer and Communications Security, CCS 00
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
13
-
-
33644890712
-
An efficient LKH tree balancing algorithm for group key management
-
D.-W. Kwak, S.J. Lee, J.W. Kim, and E. Jung An efficient LKH tree balancing algorithm for group key management IEEE Communications Letters 10 3 2006 222 224
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.3
, pp. 222-224
-
-
Kwak, D.-W.1
Lee, S.J.2
Kim, J.W.3
Jung, E.4
-
14
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
ACM New York, NY, USA
-
D. Liu, P. Ning, and K. Sun Efficient self-healing group key distribution with revocation capability Proceedings of the 10th ACM conference on com puter and communications security, CCS 03 2003 ACM New York, NY, USA 231 240
-
(2003)
Proceedings of the 10th ACM Conference on Com Puter and Communications Security, CCS 03
, pp. 231-240
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
15
-
-
84860368738
-
Delegated decryption
-
M. Walker, Springer Berlin/Heidelberg
-
Y. Mu, V. Varadharajan, and K. Quac Nguyen Delegated decryption M. Walker, Cryptography and coding, lecture notes in computer science vol. 1746 1999 Springer Berlin/Heidelberg 797
-
(1999)
Cryptography and Coding, Lecture Notes in Computer Science
, vol.1746
, pp. 797
-
-
Mu, Y.1
Varadharajan, V.2
Quac Nguyen, K.3
-
16
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Springer-Verlag London, UK
-
D. Naor, M. Naor, and J.B. Lotspiech Revocation and tracing schemes for stateless receivers Proceedings of the 21st annual international cryptology conference on advances in cryptology, CRYPTO 01 2001 Springer-Verlag London, UK 41 62
-
(2001)
Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 01
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
19
-
-
74049154660
-
Secure and efficient access to outsourced data
-
ACM New York, NY, USA
-
W. Wang, Z. Li, R. Owens, and B. Bhargava Secure and efficient access to outsourced data Proceedings of the 2009 ACM workshop on cloud computing security, CCSW 09 2009 ACM New York, NY, USA 55 66
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 09
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
20
-
-
0032178082
-
Secure group communications sing key graphs
-
ACM New York, NY, USA
-
C.K. Wong, M. Gouda, and S.S. Lam Secure group communications sing key graphs Proceedings of the ACM SIGCOMM 98 conference on applications, technologies, architectures, and protocols for computer communication, SIGCOMM 98 1998 ACM New York, NY, USA 68 79
-
(1998)
Proceedings of the ACM SIGCOMM 98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
21
-
-
0034780938
-
Reliable group rekeying: A performance analysis
-
ACM New York, NY, USA
-
Y.R. Yang, X.S. Li, X.B. Zhang, and S.S. Lam Reliable group rekeying: a performance analysis Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM 01 2001 ACM New York, NY, USA 27 38
-
(2001)
Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 01
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
|