메뉴 건너뛰기




Volumn 7397 LNCS, Issue , 2012, Pages 223-238

Privacy enhanced access control for outsourced data sharing

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; ACCESS CONTROL SCHEMES; ACCESS PATTERNS; ACCESS RULES; COARSE-GRAINED; COMMUNICATION OVERHEADS; CONTROL SOLUTIONS; DATA SHARING; PARTIAL VIEWS; READ AND WRITE ACCESS CONTROL; SENSITIVE INFORMATIONS;

EID: 84865805438     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32946-3_17     Document Type: Conference Paper
Times cited : (36)

References (15)
  • 1
    • 79953223285 scopus 로고    scopus 로고
    • Perfectly Secure Oblivious RAM without Random Oracles
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Damgård, I., Meldgaard, S., Nielsen, J.B.: Perfectly Secure Oblivious RAM without Random Oracles. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 144-163. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 144-163
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 4
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 43(3), 473 (1996)
    • (1996) Journal of the ACM (JACM) , vol.43 , Issue.3 , pp. 473
    • Goldreich, O.1    Ostrovsky, R.2
  • 5
    • 79960005023 scopus 로고    scopus 로고
    • Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation
    • Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. Springer, Heidelberg
    • Goodrich, M.T., Mitzenmacher, M.: Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576-587. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6756 , pp. 576-587
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 9
    • 44449129423 scopus 로고    scopus 로고
    • Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 10
    • 84863495459 scopus 로고    scopus 로고
    • Tight budget? Look to the 'Cloud'
    • Kundra, V.: Tight budget? look to the 'Cloud'. The New York Times (2011), http://www.nytimes.com/2011/08/31/opinion/tight-budget-look-to-the-cloud.html?- r=1
    • (2011) The New York Times
    • Kundra, V.1
  • 11
    • 77957007201 scopus 로고    scopus 로고
    • Oblivious RAM Revisited
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Pinkas, B., Reinman, T.: Oblivious RAM Revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502-519. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 502-519
    • Pinkas, B.1    Reinman, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.