-
2
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, "A view of cloud computing," Communications of the ACM, 2010.
-
(2010)
Communications of the ACM
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
4
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of ACM CCS, 2006.
-
Proc. of ACM CCS, 2006
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
78649998200
-
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, (Poster)
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. of ACM CCS (Poster), 2010.
-
(2010)
Proc. of ACM CCS
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
9
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of IEEE INFOCOM, 2010.
-
Proc. of IEEE INFOCOM, 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
10
-
-
0024946716
-
Probabilistic clock synchronization
-
F. Cristian, "Probabilistic clock synchronization," Distributed Computing, 1989.
-
(1989)
Distributed Computing
-
-
Cristian, F.1
-
12
-
-
84863146045
-
Fault-tolerant clock synchronization in distributed systems
-
P. Ramanathan, K. Shin, and R. Butler, "Fault-tolerant clock synchronization in distributed systems," Computer, 2002.
-
(2002)
Computer
-
-
Ramanathan, P.1
Shin, K.2
Butler, R.3
-
14
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. of USENIX FAST, 2003.
-
Proc. of USENIX FAST, 2003
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
15
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage,"ACM Transactions on Information and System Security, 2006.
-
(2006)
ACM Transactions on Information and System Security
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
16
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: management of access control evolution on outsourced data," in Proc. of VLDB, 2007.
-
Proc. of VLDB, 2007
-
-
Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
17
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. of ACM ASIACCS, 2010.
-
Proc. of ACM ASIACCS, 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|