-
1
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in IEEE Symposium on Security and Privacy, 2007, pp. 321-334.
-
IEEE Symposium on Security and Privacy, 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
2
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in ACM Conference on Computer and Communications Security, 2007, pp. 195-203.
-
ACM Conference on Computer and Communications Security, 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
3
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in INFOCOM, IEEE, 2010, pp. 534-542.
-
(2010)
INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
4
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS, ACM, 2006, pp. 89-98.
-
(2006)
CCS
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
5
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari, "TRBAC: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
6
-
-
17444406680
-
A generalized temporal role-based access control model
-
J. B. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A generalized temporal role-based access control model," IEEE Transactions on Knowledge and Data Engineering, vol. 17, pp. 4-23, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, pp. 4-23
-
-
Joshi, J.B.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
7
-
-
77952361637
-
Chosen-ciphertext secure proxy reencryption
-
ACM
-
R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy reencryption,"in CCS, ACM, 2007, pp. 185-194.
-
(2007)
CCS
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
8
-
-
35048848152
-
Short signatures without random oracles
-
Springer
-
D. Boneh and X. Boyen, "Short signatures without random oracles,"in EUROCRYPT, Springer, 2004, pp. 56-73.
-
(2004)
EUROCRYPT
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
ACM
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: Management of access control evolution on outsourced data," in VLDB, ACM, 2007, pp. 123-134.
-
(2007)
VLDB
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
84863269353
-
Comparison-based encryption for fine-grained access control in clouds
-
ACM, To appear
-
Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, "Comparison-based encryption for fine-grained access control in clouds," in CODASPY, ACM, 2012, To appear.
-
(2012)
CODASPY
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Yu, M.4
Zhao, H.5
-
11
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
P. S. L. M. Barreto, S. D. Galbraith, C. O'Eigeartaigh, and M. Scott, "Efficient pairing computation on supersingular abelian varieties,"Des. Codes Cryptography, vol. 42, no. 3, pp. 239-271, 2007.
-
(2007)
Des. Codes Cryptography
, vol.42
, Issue.3
, pp. 239-271
-
-
Barreto, P.S.L.M.1
Galbraith, S.D.2
O'Eigeartaigh, C.3
Scott, M.4
-
12
-
-
0242625197
-
Cryptographic access control in a distributed file system
-
ACM
-
A. Harrington and C. D. Jensen, "Cryptographic access control in a distributed file system," in SACMAT, ACM, 2003, pp. 158-165.
-
(2003)
SACMAT
, pp. 158-165
-
-
Harrington, A.1
Jensen, C.D.2
-
13
-
-
79952507198
-
-
Ph.D Thesis, Queens University Kingston, Ontario, Canada, October
-
A. V. D. M. Kayem, "Adaptive cryptographic access control for dynamic data sharing environments," Ph.D Thesis, Queens University Kingston, Ontario, Canada, October 2008.
-
(2008)
Adaptive Cryptographic Access Control for Dynamic Data Sharing Environments
-
-
Kayem, A.V.D.M.1
-
14
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, Springer, 2005, pp. 457-473.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
15
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in ICALP (2), 2008, pp. 579-591.
-
(2008)
ICALP
, Issue.2
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
16
-
-
0038349273
-
A temporal key management scheme for secure broadcasting of xml documents
-
ACM
-
E. Bertino, B. Carminati, and E. Ferrari, "A temporal key management scheme for secure broadcasting of xml documents," in CCS, ACM, 2002, pp. 31-40.
-
(2002)
CCS
, pp. 31-40
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
|