-
1
-
-
84870660657
-
Health Insurance Portability and Accountability Act of 1996 (HIPPA)
-
104th United States Congress. Health Insurance Portability and Accountability Act of 1996 (HIPPA), http://aspe.hhs.gov/admnsimp/pl104191.html
-
104th United States Congress
-
-
-
2
-
-
84870709173
-
-
Amazon S3, http://aws.amazon.com/s3/
-
Amazon S3
-
-
-
3
-
-
84870688960
-
-
Amazon SimpleDB, http://aws.amazon.com/simpledb/
-
Amazon SimpleDB
-
-
-
4
-
-
84870721918
-
-
BIHE, http://bihe.org/
-
-
-
-
7
-
-
84870700360
-
-
K2C Framework, https://sourceforge.net/projects/key2cloud/
-
K2C Framework
-
-
-
11
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS, pp. 29-43 (2005)
-
(2005)
NDSS
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
12
-
-
33750253019
-
Secure Key-Updating for Lazy Revocation
-
IBM Research, Springer, Heidelberg
-
Backes, M., Cachin, C., Oprea, A.: Secure Key-Updating for Lazy Revocation. In: Research Report RZ 3627, IBM Research, pp. 327-346. Springer, Heidelberg (2005)
-
(2005)
Research Report RZ
, vol.3627
, pp. 327-346
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
14
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society, Washington, DC
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321-334. IEEE Computer Society, Washington, DC (2007)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
17
-
-
84957718934
-
Divertible Protocols and Atomic Proxy Cryptography
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
18
-
-
85071319367
-
Bigtable: A distributed storage system for structured data
-
Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: A distributed storage system for structured data. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, vol. 7, pp. 205-218 (2006)
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, vol.7
, pp. 205-218
-
-
Chang, F.1
Dean, J.2
Ghemawat, S.3
Hsieh, W.C.4
Wallach, D.A.5
Burrows, M.6
Chandra, T.7
Fikes, A.8
Gruber, R.E.9
-
19
-
-
74049093526
-
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control
-
ACM, New York
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J.,Masuoka, R., Molina, J.: Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 85-90. ACM, New York (2009)
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
21
-
-
85180624291
-
Key regression: Enabling efficient key distribution for secure distributed storage
-
Fu, K., Kamara, S., Kohno, T.: Key regression: Enabling efficient key distribution for secure distributed storage. In: NDSS (2006)
-
(2006)
NDSS
-
-
Fu, K.1
Kamara, S.2
Kohno, T.3
-
22
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM, New York
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89-98. ACM, New York (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
23
-
-
38949169175
-
Cryptree: A folder tree structure for cryptographic file systems
-
IEEE Computer Society, Washington, DC
-
Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. In: Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems, pp. 189-198. IEEE Computer Society, Washington, DC (2006)
-
(2006)
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
, pp. 189-198
-
-
Grolimund, D.1
Meisser, L.2
Schmid, S.3
Wattenhofer, R.4
-
24
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: NDSS, pp. 131-145 (2003)
-
(2003)
NDSS
, pp. 131-145
-
-
Goh, E.J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
25
-
-
38949099335
-
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage (2003)
-
(2003)
Plutus: Scalable Secure File Sharing on Untrusted Storage
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
26
-
-
85084162793
-
A framework for evaluating storage system security
-
USENIX Association, Berkeley
-
Riedel, E., Kallahalla, M., Swaminathan, R.: A framework for evaluating storage system security. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies, FAST 2002. USENIX Association, Berkeley (2002)
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies, FAST 2002
-
-
Riedel, E.1
Kallahalla, M.2
Swaminathan, R.3
-
27
-
-
21844448913
-
Protecting multimedia data in storage: A survey of techniques emphasizing encryption
-
Stanton, P., Yurcik, W., Brumbaugh, L.: Protecting multimedia data in storage: A survey of techniques emphasizing encryption. In: IS and T/SPIE International Symposium Electronic Imaging/Storage and Retrieval Methods and Applications for Multimedia, pp. 18-29 (2005)
-
(2005)
IS and T/SPIE International Symposium Electronic Imaging/Storage and Retrieval Methods and Applications for Multimedia
, pp. 18-29
-
-
Stanton, P.1
Yurcik, W.2
Brumbaugh, L.3
-
28
-
-
78650065157
-
Security and Privacy Challenges in Cloud Computing Environments
-
Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy 8, 24-31 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
29
-
-
70350389843
-
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wang, Q.,Wang, C., Li, J., Ren, K., Lou,W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
30
-
-
84869598494
-
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services
-
Rajarajan, M., et al. (eds.) SecureComm 2011. Springer, Heidelberg
-
Xiong, H., Zhang, X., Zhu,W., Yao, D.: CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. In: Rajarajan, M., et al. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 483-492. Springer, Heidelberg (2012)
-
(2012)
LNICST
, vol.96
, pp. 483-492
-
-
Xiong, H.1
Zhang, X.2
Zhu, W.3
Yao, D.4
-
31
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE Computer Society Press, Piscataway
-
Yu, S.,Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 534-542. IEEE Computer Society Press, Piscataway (2010)
-
(2010)
Proceedings of the 29th Conference on Information Communications, INFOCOM 2010
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
32
-
-
84870707229
-
-
Technical report, Rutgers University. DCS-tr-688
-
Zarandioon, S., Yao, D., Ganapathy, V.: K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. Technical report, Rutgers University. DCS-tr-688
-
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
-
-
Zarandioon, S.1
Yao, D.2
Ganapathy, V.3
|