메뉴 건너뛰기




Volumn , Issue , 2011, Pages 764-771

End-to-end policy-based encryption and management of data in the cloud

Author keywords

Cloud; Policy enforcement; Privacy; Sticky policy

Indexed keywords

CLOUD MODELS; DATA ATTRIBUTES; DATA MANAGEMENT SOLUTION; DECRYPTION KEYS; FINE-GRAINED CONTROL; KEY MANAGEMENT; POLICY ENFORCEMENT; PRIVACY ISSUE; THIRD PARTIES;

EID: 84863151459     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2011.118     Document Type: Conference Paper
Times cited : (17)

References (26)
  • 1
    • 79959961301 scopus 로고    scopus 로고
    • Toward accountability in the cloud
    • IEEE Computer Society, July/August issue
    • Pearson, S. "Toward Accountability in the Cloud", View from the Cloud, IEEE Internet Computing, IEEE Computer Society, July/August issue, vol. 15, no. 4, pp. 64-69, 2011.
    • (2011) View from the Cloud, IEEE Internet Computing , vol.15 , Issue.4 , pp. 64-69
    • Pearson, S.1
  • 3
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
    • Casassa Mont, M., Pearson S., Bramhall, P. "Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services", Proc. DEXA 2003, IEEE Computer Society, pp. 377-382, 2003.
    • (2003) Proc. DEXA 2003, IEEE Computer Society , pp. 377-382
    • Casassa Mont, M.1    Pearson, S.2    Bramhall, P.3
  • 4
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. "How to Share a Secret", Communications of ACM, 22, pp. 612-613, 1979.
    • (1979) Communications of ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 6
    • 84863125437 scopus 로고    scopus 로고
    • Voltage,(www.voltage.com/technology/Technology- FormatPreservingEncryption.htm
  • 7
    • 84863153247 scopus 로고    scopus 로고
    • Navajos, http://navajosystems.com/technology-encryption.asp
  • 8
    • 70549111101 scopus 로고    scopus 로고
    • Formatpreserving encryption
    • Selected Areas in Cryptography
    • Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T., "Formatpreserving Encryption", Selected Areas in Cryptography, LNCS, vol 5867, pp. 295-312, 2009.
    • (2009) LNCS , vol.5867 , pp. 295-312
    • Bellare, M.1    Ristenpart, T.2    Rogaway, P.3    Stegers, T.4
  • 9
    • 72849125986 scopus 로고    scopus 로고
    • IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2,2004. http://www.zurich.ibm.com/security/enterpriseprivacy/ epal/
    • (2004) EPAL Specification, v1.2
  • 10
    • 84863171639 scopus 로고    scopus 로고
    • OASIS: XACML,http://www.oasisopen.org/committees/tc-home.php?wg-abbrev= xacml
  • 12
    • 84863125442 scopus 로고    scopus 로고
    • Can access control be extended to deal with data handling in privacy scenarios?
    • November
    • Bussard, L. Becker, M.Y., "Can access control be extended to deal with data handling in privacy scenarios?", Workshop on Access Control Application Scenarios, W3C, November 2009. http://www.w3.org/2009/policy-ws/
    • (2009) Workshop on Access Control Application Scenarios, W3C
    • Bussard, L.1    Becker, M.Y.2
  • 19
    • 33845532776 scopus 로고    scopus 로고
    • A system for privacy-aware resource allocation and data processing in dynamic environments
    • DOI 10.1007/0-387-33406-8-44, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
    • Pearson, S., Casassa Mont, M., "A System for Privacy-aware Resource Allocation and Data Processing in Dynamic Environments", Proc. INetSec06, IFIP, vol. 201, Springer Boston, pp. 471-482, 2006. (Pubitemid 44920681)
    • (2006) IFIP International Federation for Information Processing , vol.201 , pp. 471-482
    • Pearson, S.1    Casassa-Mont, M.2
  • 20
    • 38949103681 scopus 로고    scopus 로고
    • Securing information transfer in distributed computing environments
    • DOI 10.1109/MSP.2008.19
    • Pearson, S., Casassa Mont, M. Novoa,M., "Securing Information Transfer within Distributed Computing Environments", IEEE Security & Privacy Magazine, Jan/Feb issue, volume 6, number 1, pp. 34-42, IEEE, 2008. (Pubitemid 351229831)
    • (2008) IEEE Security and Privacy , vol.6 , Issue.1 , pp. 34-42
    • Pearson, S.1    Casassa-Mont, M.2    Novoa, M.3
  • 21
    • 79955822611 scopus 로고    scopus 로고
    • Data usage control in the future internet cloud
    • Future Interner Assembly, eds. J. Domingue et al. Springer
    • Bezzi, M. and Trabelsi, S. "Data Usage Control in the Future Internet Cloud", Future Interner Assembly, eds. J. Domingue et al., LNCS 6656, Springer, pp. 223-231, 2011.
    • (2011) LNCS , vol.6656 , pp. 223-231
    • Bezzi, M.1    Trabelsi, S.2
  • 22
    • 35548931529 scopus 로고    scopus 로고
    • Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
    • DOI 10.1007/s10796-007-9057-0
    • Zuo, Y, O'Keefe, T., "Post-release information privacy protection: A framework and next-generation priacy-enhanced operating system", Information Systems Frontiers, vol9, no 5, pp. 451-467, Springer, 2007. http://www.springerlink.com/content/03718003288553u5/ (Pubitemid 350007342)
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 451-467
    • Zuo, Y.1    O'keefe, T.2
  • 25
    • 84863153248 scopus 로고    scopus 로고
    • Ensuring Consent and Revocation project
    • EnCoRe, Ensuring Consent and Revocation project, www.encoreproject.info


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.