-
1
-
-
77957950747
-
-
Cloud Computing, an IDC update (2010), http://www.slideshare.net/ JorFigOr/cloud-computing-2010-an-idc-update
-
(2010)
Cloud Computing, An IDC Update
-
-
-
2
-
-
42549151431
-
Secure Content Distribution by Parallel Processing from Cooperative Intermediaries
-
Koglin, Y., Yao, D., Bertino, E.: Secure Content Distribution by Parallel Processing from Cooperative Intermediaries. IEEE Transactions on Parallel and Distributed Systems 19(5), 615-626 (2008)
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.5
, pp. 615-626
-
-
Koglin, Y.1
Yao, D.2
Bertino, E.3
-
3
-
-
35248844090
-
Decentralized Authorization and Data Security in Web Content Delivery
-
Yao, D., Koglin, Y., Bertino, E., Tamassia, R.: Decentralized Authorization and Data Security in Web Content Delivery. In: Proc. ACM Symp. on Applied Computing (SAC), pp. 1654-1661 (2007)
-
(2007)
Proc. ACM Symp. on Applied Computing (SAC)
, pp. 1654-1661
-
-
Yao, D.1
Koglin, Y.2
Bertino, E.3
Tamassia, R.4
-
4
-
-
0032661699
-
Multicast Security: A Taxonomy and Some Efficient Constructions
-
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proceedings of INFOCOM (March 1999)
-
Proceedings of INFOCOM (March 1999)
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
5
-
-
84870716531
-
-
AWS Customer Agreement (2011), http://aws.amazon.com/agreement/
-
(2011)
-
-
-
6
-
-
84869596127
-
-
Technical report, Huawei Research
-
Xiong, H., Zhang, X., Zhu, W., Yao, D.: CloudSeal: End-to-End Content Protection in Cloud-based Storage and Delivery Services. Technical report, Huawei Research (2011)
-
(2011)
CloudSeal: End-to-End Content Protection in Cloud-based Storage and Delivery Services
-
-
Xiong, H.1
Zhang, X.2
Zhu, W.3
Yao, D.4
-
7
-
-
74049152260
-
Hey, You, Get off ofMy cloud! Exploring Information Leakage in Third-Party Compute Clouds
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get Off ofMy cloud! Exploring Information Leakage in Third-Party Compute Clouds. In: Proceedings of ACM Conference on Computer and Communications Security (2009)
-
Proceedings of ACM Conference on Computer and Communications Security (2009)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
8
-
-
33745218758
-
Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Trans. Inf. Syst. Secur. 9, 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
9
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
-
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
10
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
12
-
-
0018545449
-
How to Share A Secret
-
November
-
Shamir, A.: How to Share A Secret. Commun. ACM 22 (November 1979)
-
(1979)
Commun. ACM
, vol.22
-
-
Shamir, A.1
-
13
-
-
80051880293
-
Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing
-
Li, M., Yu, S., Cao, N., Lou, W.: Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing. In: Proceedings of The 31st Int'l Conference on Distributed Computing Systems, ICDCS 2011 (2011)
-
(2011)
Proceedings of the 31st Int'l Conference on Distributed Computing Systems, ICDCS 2011
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
14
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proceedings of INFOCOM (2010)
-
Proceedings of INFOCOM (2010)
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
15
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: Proceedings of INFOCOM (2010)
-
Proceedings of INFOCOM (2010)
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
16
-
-
84865815069
-
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
-
Rajarajan, M., et al. (eds.) SecureComm 2011. Springer, Heidelberg
-
Zarandioon, S., Yao, D., Ganapathy, V.: K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. In: Rajarajan, M., et al. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 59-76. Springer, Heidelberg (2012)
-
(2012)
LNICST
, vol.96
, pp. 59-76
-
-
Zarandioon, S.1
Yao, D.2
Ganapathy, V.3
-
17
-
-
85033460636
-
Plutus: Scalable Secure File Sharing on Untrusted Storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable Secure File Sharing on Untrusted Storage. In: Proceedings of FAST, Berkeley, CA, USA (2003)
-
Proceedings of FAST, Berkeley, CA, USA (2003)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
19
-
-
84957656774
-
MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
-
Rizzo, L., Fdida, S. (eds.) NGC 1999. Springer, Heidelberg
-
Briscoe, B.: MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol. 1736, pp. 301-320. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1736
, pp. 301-320
-
-
Briscoe, B.1
-
21
-
-
85180804257
-
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
-
Traynor, P., Butler, K.R.B., Enck, W., McDaniel, P.: Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. In: NDSS (2008)
-
(2008)
NDSS
-
-
Traynor, P.1
Butler, K.R.B.2
Enck, W.3
McDaniel, P.4
|