-
2
-
-
0000636954
-
The VersaKey framework: Versatile group key management
-
Sep.
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The VersaKey framework: Versatile group key management," IEEE Journal on Selected Areas in Communications, vol. 17, no. 9, pp. 1614-1631, Sep. 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
3
-
-
0033893174
-
Secure group communication using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communication using key graphs," IEEE/ACM Transaction on Networking, vol. 8, no. 1, 2000.
-
(2000)
IEEE/ACM Transaction on Networking
, vol.8
, Issue.1
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
5
-
-
84874317232
-
Handling confidential data on the untrusted cloud: An agent-based approach
-
E. Damiani and F. Pagano, "Handling confidential data on the untrusted cloud: An agent-based approach," in Cloud Computing '10, 2010.
-
(2010)
Cloud Computing '10
-
-
Damiani, E.1
Pagano, F.2
-
6
-
-
84874313517
-
Secure document service for cloud computing
-
J.-S. Xu, R.-C. Huang, W.-M. Huang, and G. Yang, "Secure document service for cloud computing," in ClouCom '09, 2009.
-
(2009)
ClouCom '09
-
-
Xu, J.-S.1
Huang, R.-C.2
Huang, W.-M.3
Yang, G.4
-
7
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
W. Lou, K. Ren, C. Wang, and S. Yu, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proceedings of the 2010 Infocom Conference, ser. Infocom '10.
-
Proceedings of the 2010 Infocom Conference, Ser. Infocom '10
-
-
Lou, W.1
Ren, K.2
Wang, C.3
Yu, S.4
-
8
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: Management of access control evolution on outsourced data," in Proceedings of the 2007 VLDB Conference, ser. VLDB '07.
-
Proceedings of the 2007 VLDB Conference, Ser. VLDB '07
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
38949169175
-
Cryptree: A folder tree structure for cryptographic file systems
-
Leeds, United Kingdom
-
D. Grolimund, L. Meisser, S. Schmid, and R. Wattenhofer, "Cryptree: A Folder Tree Structure for Cryptographic File Systems," in 25th IEEE Symposium on Reliable Distributed Systems (SRDS), Leeds, United Kingdom.
-
25th IEEE Symposium on Reliable Distributed Systems (SRDS)
-
-
Grolimund, D.1
Meisser, L.2
Schmid, S.3
Wattenhofer, R.4
-
12
-
-
8344221947
-
Scalable hierarchical access control in secure group communications
-
Y. Sun and K. R. Liu, "Scalable hierarchical access control in secure group communications," in Proceedings of the 2004 IEEE Infocom, 2004.
-
(2004)
Proceedings of the 2004 IEEE Infocom
-
-
Sun, Y.1
Liu, K.R.2
-
13
-
-
78649878982
-
A key management scheme for hierarchical access control in group communication
-
Q. Zhang, Y. Wang, and J. P. Jue, "A key management scheme for hierarchical access control in group communication," International Journal of Network Security, vol. 7, no. 3, pp. 323-334, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 323-334
-
-
Zhang, Q.1
Wang, Y.2
Jue, J.P.3
-
14
-
-
70349823934
-
What's inside the cloud? an architectural map of the cloud landscape
-
A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, "What's inside the cloud? an architectural map of the cloud landscape," in Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, ser. CLOUD '09.
-
Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Ser. CLOUD '09
-
-
Lenk, A.1
Klems, M.2
Nimis, J.3
Tai, S.4
Sandholm, T.5
-
17
-
-
84874290590
-
A secure cloud gateway based upon xml and web services
-
S. Graf, "A secure cloud gateway based upon xml and web services," in ECOWS'11, Phd Symposium, 2011.
-
(2011)
ECOWS'11, Phd Symposium
-
-
Graf, S.1
|