-
1
-
-
34547282859
-
Provably-secure time-bound hierarchical key assignment schemes
-
G. Ateniese, A. D. Santis, A. L. Ferrara, and B. Masucci. Provably-secure time-bound hierarchical key assignment schemes. In ACM Conference on Computer and Communications Security, pages 288-297, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 288-297
-
-
Ateniese, G.1
Santis, A.D.2
Ferrara, A.L.3
Masucci, B.4
-
2
-
-
0030087035
-
A temporal access control mechanism for database systems
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. A temporal access control mechanism for database systems. IEEE Trans. Knowl. Data Eng., 8(1):67-80, 1996. (Pubitemid 126774132)
-
(1996)
IEEE Transactions on Knowledge and Data Engineering
, vol.8
, Issue.1
, pp. 67-80
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
3
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari. Trbac: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
4
-
-
0038349273
-
A temporal key management scheme for secure broadcasting of xml documents
-
V. Atluri, editor, ACM
-
E. Bertino, B. Carminati, and E. Ferrari. A temporal key management scheme for secure broadcasting of xml documents. In V. Atluri, editor, ACM Conference on Computer and Communications Security, pages 31-40. ACM, 2002.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 31-40
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
-
6
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology (CRYPTO'2001)
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing . In Advances in Cryptology (CRYPTO'2001), volume 2139 of LNCS, pages 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
24144433396
-
Evaluating2- Dnf formulas on ciphertexts
-
J. Kilian, editor, TCC, Springer
-
D. Boneh, E.-J. Goh, and K. Nissim. Evaluating2- dnf formulas on ciphertexts. In J. Kilian, editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 325-341. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
8
-
-
33646834785
-
Pairings on elliptic curves over finite commutative rings
-
S. D. Galbraith and J. F. McKee. Pairings on elliptic curves over finite commutative rings. In 10th IMAIn ternational Conference of Cryptography and Coding, Cirencester, UK, December 19-21, 2005, Proceedings, pages 392-409, 2005.
-
(2005)
10th IMAIn Ternational Conference of Cryptography and Coding, Cirencester, UK, December 19-21, 2005, Proceedings
, pp. 392-409
-
-
Galbraith, S.D.1
McKee, J.F.2
-
9
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai. Bounded ciphertext policy attribute based encryption. In ICALP (2), pages 579-591, 2008.
-
(2008)
ICALP
, Issue.2
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
10
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89-98, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
11
-
-
0242625197
-
Cryptographic access control in a distributed file system
-
ACM
-
A. Harrington and C. D. Jensen. Cryptographic access control in a distributed file system. In SACMAT, pag es 158-165. ACM, 2003.
-
(2003)
SACMAT
, pp. 158-165
-
-
Harrington, A.1
Jensen, C.D.2
-
12
-
-
70350630621
-
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
-
L. Ibraimi, Q. Tang, P. H. Hartel, and W. Jonker. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In ISPEC, pages 1-12, 2009.
-
(2009)
ISPEC
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.H.3
Jonker, W.4
-
15
-
-
77958029458
-
Time-specific encryption
-
J. Garay and R. De Prisco, editors, Security and Cryptography for Networks, Springer Berlin / Heidelberg
-
K. Paterson and E. Quaglia. Time-specific encryption. In J. Garay and R. De Prisco, editors, Security and Cryptography for Networks, volume 6280 of Lecture Notes in Computer Science, pages 1-16. Springer Berlin / Heidelberg, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6280
, pp. 1-16
-
-
Paterson, K.1
Quaglia, E.2
-
16
-
-
24944554962
-
Fuzzy identity-based encryption
-
A. Sahai and B. Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
17
-
-
34548050702
-
New constructions for provably-secure time-bound hierarchical key assignment schemes
-
A. D. Santis, A. L. Ferrara, and B. Masucci. New constructions for provably-secure time-bound hierarchical key assignment schemes. In SACMAT, pages 133-138, 2007.
-
(2007)
SACMAT
, pp. 133-138
-
-
Santis, A.D.1
Ferrara, A.L.2
Masucci, B.3
-
18
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
may
-
E. Shi, J. Bethencourt, T. H. H. Chan, D. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In Security and Privacy, 2007. SP'07. IEEE Symposium on, pages 350-364, may 2007.
-
(2007)
Security and Privacy, 2007. SP'07. IEEE Symposium on
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.H.H.3
Song, D.4
Perrig, A.5
-
19
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
DOI 10.1109/69.979981
-
W. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. on Knowledge and Data Engineering, 14(1):182-188, 2002. (Pubitemid 34198202)
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
20
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, pages 534-542, 2010.
-
(2010)
INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|