-
1
-
-
84865067360
-
Are security issues delaying adoption of cloud computing?
-
Apr.
-
E. Messmer, "Are security issues delaying adoption of cloud computing?," Network World, Apr. 2009 [Online]. Available: http://www.networkworld.com/news/2009/042709-burning-security-cloud-computing. html
-
(2009)
Network World
-
-
Messmer, E.1
-
3
-
-
34548731375
-
Ciphertext-policy attributebased encryption,"
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
84877893617
-
-
National Inst. Standards and Technol., Secure Hash Standard (SHS), FIPS Publication 180-1, 1995
-
National Inst. Standards and Technol., Secure Hash Standard (SHS), FIPS Publication 180-1, 1995.
-
-
-
-
6
-
-
85059214449
-
-
H. C. A. Van Tilborg and S. Jajodia, Eds., 2nd ed. Berlin, Germany: Springer
-
M. D. Soete, "Attribute certificate," in Encyclopedia of Cryptography and Security, H. C. A. Van Tilborg and S. Jajodia, Eds., 2nd ed. Berlin, Germany: Springer, 2011, p. 51.
-
(2011)
Attribute Certificate," Encyclopedia of Cryptography and Security
, pp. 51
-
-
Soete, M.D.1
-
7
-
-
77749271080
-
Query privace in wireless sensor networks,"
-
Art. ID 14
-
B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan, "Query privace in wireless sensor networks," ACM Trans. Sensor Networks, vol. 6, no. 2, 2010, Art. ID 14.
-
(2010)
ACM Trans. Sensor Networks
, vol.6
, Issue.2
-
-
Carbunar, B.1
Yu, Y.2
Shi, W.3
Pearce, M.4
Vasudevan, V.5
-
8
-
-
38949184514
-
Toward a usage-based security framework for collaborative computing systems,"
-
X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, "Toward a usage-based security framework for collaborative computing systems," ACM Trans. Inf. Syst. Security, vol. 11, no. 1, pp. 1-36, 2008.
-
(2008)
ACM Trans. Inf. Syst. Security
, vol.11
, Issue.1
, pp. 1-36
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
9
-
-
79956030125
-
EASiER: Encryption-based access control in social networks with efficient revocation
-
S. Jahid, P.Mittal, and N. Borisov, "EASiER: Encryption-based access control in social networks with efficient revocation," in Proc. ACM Symp. Inf. Computer Commun. Security, Mar. 2011, pp. 411-415.
-
(2011)
Proc. ACM Symp. Inf. Computer Commun. Security, Mar.
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
10
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S.Yu, C. Wang,K. Ren, andW. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE Int. Conf. Comput. Commun., 2010, pp. 1-9.
-
(2010)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
11
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B.Waters, "Attribute based encryption for fine-grained access conrol of encrypted data," in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89-98. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
12
-
-
34547325357
-
Secure attribute based systems
-
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute based systems," in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99-112.
-
(2006)
Proc. ACMConf. Comput. Commun. Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
13
-
-
84855357673
-
Self-protecting electronic medical records using attribute-based encryption
-
Oct.
-
J. A. Akinyele, C. U. Lehmanny, M. D. Green, M. W. Pagano, Z. N. J. Petersonz, and A. D. Rubin, "Self-protecting electronic medical records using attribute-based encryption," in Proc. ACM Conf. Comput. Commun. Security: Workshop on Security and Privacy in Smartphones and Mobile Devices, Oct. 2011, pp. 75-86.
-
(2011)
Proc. ACM Conf. Comput. Commun. Security: Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 75-86
-
-
Akinyele, J.A.1
Lehmanny, C.U.2
Green, M.D.3
Pagano, M.W.4
Petersonz, Z.N.J.5
Rubin, A.D.6
-
14
-
-
70450257780
-
Persona: An online social network with user defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: An online social network with user defined privacy," in Proc. ACM SIGCOMM Conf. Data Commun., 2009, pp. 135-146.
-
(2009)
Proc. ACM SIGCOMM Conf. Data Commun.
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
16
-
-
70349881799
-
Enhancing progressive encryption for scalable video streams
-
Proc. EUNICE, Open European Summer School and IFIP TC6.6 Workshop on The Internet of the Future 2009 5733
-
V. Gergely and G. Feher, "Enhancing progressive encryption for scalable video streams," in Proc. EUNICE, Open European Summer School and IFIP TC6.6 Workshop on The Internet of the Future, 2009, vol. 5733, Lecture Notes in Computer Science, pp. 51-58.
-
Lecture Notes in Computer Science
, pp. 51-58
-
-
Gergely, V.1
Feher, G.2
-
17
-
-
34648841043
-
Flexible access control to JPEG 2000 image code-streams
-
DOI 10.1109/TMM.2007.902865
-
Y. Wu, D. Ma, and R. H. Deng, "Flexible access control to JPEG2000 image code-streams," IEEE Trans. Multimedia, vol. 9, no. 6, pp. 1314-1324, Oct. 2007. (Pubitemid 47460409)
-
(2007)
IEEE Transactions on Multimedia
, vol.9
, Issue.6
, pp. 1314-1324
-
-
Wu, Y.1
Ma, D.2
Deng, R.H.3
-
18
-
-
84877895404
-
-
ISO/IEC 14496-2, Coding of Audio-Visual Objects-Part 2: Visual
-
ISO/IEC 14496-2, Coding of Audio-Visual Objects-Part 2: Visual.
-
-
-
-
19
-
-
16244382857
-
Scalable protection for MPEG-4 fine granularity scalability
-
DOI 10.1109/TMM.2005.843340
-
B. B. Zhu, C. Yuan, Y. Wang, and S. Li, "Scalable protection for MPEG-4 fine granularity scalability," IEEE Trans. Multimedia, vol. 7, no. 2, pp. 222-233, Apr. 2005. (Pubitemid 40454752)
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, Issue.2
, pp. 222-233
-
-
Zhu, B.B.1
Yuan, C.2
Wang, Y.3
Li, S.4
-
20
-
-
34748835762
-
Overview of the scalable video coding extension of the H.264/AVC standard
-
DOI 10.1109/TCSVT.2007.905532
-
T. W. H. Schwarz and D. Marpe, "Overview of the scalable video coding extension of the h.264/avc standard," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 9, pp. 1103-1120, Sep. 2007. (Pubitemid 47483052)
-
(2007)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.17
, Issue.9
, pp. 1103-1120
-
-
Schwarz, H.1
Marpe, D.2
Wiegand, T.3
-
21
-
-
57849148153
-
Efficient selective encryption scheme for the H.264/scalable video coding (SVC)
-
S.-W. Park and S.-U. Shin, "Efficient selective encryption scheme for the H.264/scalable video coding (SVC)," in Proc. Int. Conf. Networked Computing Adv. Inf. Manag., 2008, vol. 1, pp. 371-376.
-
(2008)
Proc. Int. Conf. Networked Computing Adv. Inf. Manag.
, vol.1
, pp. 371-376
-
-
Park, S.-W.1
Shin, S.-U.2
-
22
-
-
77955307145
-
Secure service convergence based on scalablemedia coding
-
S. Lian, "Secure service convergence based on scalablemedia coding," Telecommun. Syst., vol. 45, no. 1, pp. 21-35, 2010.
-
(2010)
Telecommun. Syst.
, vol.45
, Issue.1
, pp. 21-35
-
-
Lian, S.1
-
23
-
-
70350655643
-
NAL level encryption for scalable video coding
-
C. Li,X. Zhou, andY. Zhong, "NAL level encryption for scalable video coding," in Proc. Pacific-Rim Conf. Multimedia, 2008, vol. 5353, Lecture Notes in Computer Sci., pp. 496-505.
-
Proc. Pacific-Rim Conf. Multimedia 2008, 5353 Lecture Notes in Computer Sci.
, pp. 496-505
-
-
Li, C.1
Zhou, X.2
Zhong, Y.3
-
24
-
-
79953737719
-
Scalable video encryption of H.264 SVC codec
-
G. B. Algin and E. T. Tunali, "Scalable video encryption of H.264 SVC codec," J. Vis. Commun. Image Representation, vol. 22, no. 4, pp. 353-364, 2011.
-
(2011)
J. Vis. Commun. Image Representation
, vol.22
, Issue.4
, pp. 353-364
-
-
Algin, G.B.1
Tunali, E.T.2
-
25
-
-
33845451151
-
Scalable protection and access control in full scalable video coding
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
Y. G. Won, T. M. Bae, and Y. M. Ro, "Scalable protection and access control in full scalable video coding," in Proc. Int. Workshop Digital Watermarking, 2006, pp. 407-421. (Pubitemid 44891653)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4283
, pp. 407-421
-
-
Won, Y.G.1
Bae, T.M.2
Ro, Y.M.3
-
26
-
-
69249226347
-
Efficient in-network adaptation of encrypted H.264/SVC content
-
H. Hellwagner, R. Kuschnig, T. Stutz, and A. Uhl, "Efficient in-network adaptation of encrypted H.264/SVC content," Image Commun., vol. 24, no. 9, pp. 740-758, 2009.
-
(2009)
Image Commun.
, vol.24
, Issue.9
, pp. 740-758
-
-
Hellwagner, H.1
Kuschnig, R.2
Stutz, T.3
Uhl, A.4
-
28
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195-203.
-
(2007)
Proc. ACM Conf. Comput. Commun. Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
29
-
-
84877907868
-
-
Pairing-Based Cryptography Library [Online]
-
Pairing-Based Cryptography Library [Online].Available: http://crypto. stanford.edu/pbc/
-
-
-
|