메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2576-2580

Towards temporal access control in cloud computing

Author keywords

Cloud Computing; Cryptography; Integer Comparison; Re Encryption; Temporal Access Control

Indexed keywords

ATTRIBUTE BASED ACCESS CONTROL; CLOUD SERVICES; DATA ACCESS; DATA USERS; ENCRYPTED DATA; ENCRYPTION SCHEMES; INTEGER COMPARISON; RE-ENCRYPTION; SECURITY MECHANISM; SECURITY STRENGTHS; TEMPORAL ATTRIBUTES; TEMPORAL CONSTRAINTS;

EID: 84861589588     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195656     Document Type: Conference Paper
Times cited : (80)

References (16)
  • 3
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • IEEE
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in INFOCOM, IEEE, 2010, pp. 534-542.
    • (2010) INFOCOM , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 4
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • ACM
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS, ACM, 2006, pp. 89-98.
    • (2006) CCS , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 5
    • 84944792110 scopus 로고    scopus 로고
    • TRBAC: A temporal role-based access control model
    • E. Bertino, P. A. Bonatti, and E. Ferrari, "TRBAC: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 191-233
    • Bertino, E.1    Bonatti, P.A.2    Ferrari, E.3
  • 7
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy reencryption
    • ACM
    • R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy reencryption,"in CCS, ACM, 2007, pp. 185-194.
    • (2007) CCS , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 8
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Springer
    • D. Boneh and X. Boyen, "Short signatures without random oracles,"in EUROCRYPT, Springer, 2004, pp. 56-73.
    • (2004) EUROCRYPT , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 9
    • 85011043313 scopus 로고    scopus 로고
    • Over-encryption: Management of access control evolution on outsourced data
    • ACM
    • S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: Management of access control evolution on outsourced data," in VLDB, ACM, 2007, pp. 123-134.
    • (2007) VLDB , pp. 123-134
    • Di Vimercati, S.D.C.1    Foresti, S.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 10
    • 84863269353 scopus 로고    scopus 로고
    • Comparison-based encryption for fine-grained access control in clouds
    • ACM, To appear
    • Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, "Comparison-based encryption for fine-grained access control in clouds," in CODASPY, ACM, 2012, To appear.
    • (2012) CODASPY
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Yu, M.4    Zhao, H.5
  • 12
    • 0242625197 scopus 로고    scopus 로고
    • Cryptographic access control in a distributed file system
    • ACM
    • A. Harrington and C. D. Jensen, "Cryptographic access control in a distributed file system," in SACMAT, ACM, 2003, pp. 158-165.
    • (2003) SACMAT , pp. 158-165
    • Harrington, A.1    Jensen, C.D.2
  • 14
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Springer
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, Springer, 2005, pp. 457-473.
    • (2005) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 15
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in ICALP (2), 2008, pp. 579-591.
    • (2008) ICALP , Issue.2 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 16
    • 0038349273 scopus 로고    scopus 로고
    • A temporal key management scheme for secure broadcasting of xml documents
    • ACM
    • E. Bertino, B. Carminati, and E. Ferrari, "A temporal key management scheme for secure broadcasting of xml documents," in CCS, ACM, 2002, pp. 31-40.
    • (2002) CCS , pp. 31-40
    • Bertino, E.1    Carminati, B.2    Ferrari, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.