메뉴 건너뛰기




Volumn 7397 LNCS, Issue , 2012, Pages 215-222

Dynamic accumulator based discretionary access control for outsourced storage with unlinkable access

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL LISTS; ANONYMOUS CREDENTIAL; DATA ITEMS; DISCRETIONARY ACCESS CONTROL; DYNAMIC ACCUMULATORS; OBLIVIOUS TRANSFER; ON DYNAMICS; OUTSOURCE; PRIVACY PRESERVING; STORAGE SERVICES;

EID: 84865830228     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32946-3_16     Document Type: Conference Paper
Times cited : (15)

References (14)
  • 1
    • 85012908743 scopus 로고
    • One-Way Accumulators: A Decentralized Alternative to Digital Signatures (Extended Abstract)
    • Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • Benaloh, J.C., de Mare, M.: One-Way Accumulators: A Decentralized Alternative to Digital Signatures (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274-285. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 274-285
    • Benaloh, J.C.1    De Mare, M.2
  • 2
    • 35048848152 scopus 로고    scopus 로고
    • Short Signatures Without Random Oracles
    • Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short Signatures Without Random Oracles. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 4
    • 79952510570 scopus 로고    scopus 로고
    • Oblivious Transfer with Hidden Access Control Policies
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Camenisch, J., Dubovitskaya, M., Neven, G., Zaverucha, G.M.: Oblivious Transfer with Hidden Access Control Policies. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 192-209. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 192-209
    • Camenisch, J.1    Dubovitskaya, M.2    Neven, G.3    Zaverucha, G.M.4
  • 5
    • 67049119910 scopus 로고    scopus 로고
    • An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Camenisch, J., Kohlweiss, M., Soriente, C.: An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481-500. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 481-500
    • Camenisch, J.1    Kohlweiss, M.2    Soriente, C.3
  • 6
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 38049032965 scopus 로고    scopus 로고
    • Fragmentation and Encryption to Enforce Privacy in Data Storage
    • Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and Encryption to Enforce Privacy in Data Storage. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171-186. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 171-186
    • Ciriani, V.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Jajodia, S.4    Paraboschi, S.5    Samarati, P.6
  • 9
    • 84857078897 scopus 로고    scopus 로고
    • Oblivious Outsourced Storage with Delegation
    • Danezis, G. (ed.) FC 2011. Springer, Heidelberg
    • Franz, M., Williams, P., Carbunar, B., Katzenbeisser, S., Peter, A., Sion, R., Sotakova, M.: Oblivious Outsourced Storage with Delegation. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 127-140. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7035 , pp. 127-140
    • Franz, M.1    Williams, P.2    Carbunar, B.3    Katzenbeisser, S.4    Peter, A.5    Sion, R.6    Sotakova, M.7
  • 11
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic Cloud Storage
    • Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. Springer, Heidelberg
    • Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 12
    • 24944520998 scopus 로고    scopus 로고
    • Authentication and Integrity in Outsourced Databases
    • The Internet Society
    • Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and Integrity in Outsourced Databases. In: NDSS. The Internet Society (2004)
    • (2004) NDSS
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 13
    • 70349278621 scopus 로고    scopus 로고
    • Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage
    • ACM
    • Williams, P., Sion, R., Carbunar, B.: Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage. In: ACM Conference on Computer and Communications Security, pp. 139-148. ACM (2008)
    • (2008) ACM Conference on Computer and Communications Security , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 14
    • 84865815069 scopus 로고    scopus 로고
    • K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
    • Rajarajan, M., et al. (eds.) SecureComm 2011. Springer, Heidelberg
    • Zarandioon, S., Yao, D(D.), Ganapathy, V.: K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. In: Rajarajan, M., et al. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 59-76. Springer, Heidelberg (2012)
    • (2012) LNICST , vol.96 , pp. 59-76
    • Zarandioon, S.1    Yao, D.2    Ganapathy, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.