-
1
-
-
84870062172
-
-
Accessed on June 11, 2012
-
Amazon, 2012. Amazon Simple Storage Service. Available from http://aws.amazon.com/s3/ [Accessed on June 11, 2012].
-
(2012)
Amazon Simple Storage Service
-
-
-
2
-
-
33947130171
-
Lazy Revocation in Cryptographic File Systems
-
doi:10.1109/SISW.2005.7
-
Backes, M., Cachin, C., Oprea, A., 2005. Lazy Revocation in Cryptographic File Systems. Proc. 3rd IEEE Int. Security in Storage Workshop, p.1-11. [doi:10.1109/SISW.2005.7]
-
(2005)
Proc. 3rd IEEE Int. Security in Storage Workshop
, pp. 1-11
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
3
-
-
34548731375
-
Ciphertext-Policy Attribute-Based Encryption
-
doi:10.1109/SP.2007.11
-
Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-Policy Attribute-Based Encryption. IEEE Symp. on Security and Privacy, p.321-334. [doi:10.1109/SP.2007.11]
-
(2007)
IEEE Symp. on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
84055208763
-
-
Accessed on June 10, 2012
-
Bethencourt, J., Sahai, A., Waters, B., 2012. Ciphertext-Policy Attribute-Based Encryption. Available from http://acsc.cs.utexas.edu/cpabe/ [Accessed on June 10, 2012].
-
(2012)
Ciphertext-Policy Attribute-Based Encryption
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
50249162614
-
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
-
doi:10.1109/SP.2008.12
-
Blanchet, B., Chaudhuri, A., 2008. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. IEEE Symp. on Security and Privacy, p.417-431. [doi:10.1109/SP.2008.12]
-
(2008)
IEEE Symp. on Security and Privacy
, pp. 417-431
-
-
Blanchet, B.1
Chaudhuri, A.2
-
6
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
1729054
-
Blaze, M., Bleumer, G., Strauss, M., 1998. Divertible protocols and atomic proxy cryptography. LNCS, 1403:127-144. [doi:10.1007/BFb0054122]
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
7
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
2237311
-
Boneh, D., Gentry, C., Waters, B., 2005. Collusion resistant broadcast encryption with short ciphertexts and private keys. LNCS, 3621:258-275. [doi:10.1007/11535218-16]
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
85011043313
-
Over-Encryption: Management of Access Control Evolution on Outsourced Data
-
di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P., 2007. Over-Encryption: Management of Access Control Evolution on Outsourced Data. Proc. 33rd Int. Conf. on Very Large Data Bases, p.123-134.
-
(2007)
Proc. 33rd Int. Conf. on Very Large Data Bases
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
85018107502
-
Vanish: Increasing Data Privacy with Self-Destructing Data
-
Geambasu, R., Kohno, T., Levy, A., Levy, H.M., 2009. Vanish: Increasing Data Privacy with Self-Destructing Data. Proc. 18th USENIX Security Symp., p.299-333.
-
(2009)
Proc. 18th USENIX Security Symp.
, pp. 299-333
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
11
-
-
34547273527
-
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
-
doi:10.1145/1180405.1180418
-
Goyal, V., Pandey, O., Sahai, A., Waters, B., 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proc. 13th ACM Conf. on Computer and Communications Security, p.89-98. [doi:10.1145/1180405. 1180418]
-
(2006)
Proc. 13th ACM Conf. on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
12
-
-
84875677008
-
-
Hadoop [Accessed on June 28, 2012]
-
Hadoop, 2012. HDFS Architecture Guide. Available from http://hadoop.apache.org/docs/hdfs/current/hdfs-design.html [Accessed on June 28, 2012].
-
(2012)
HDFS Architecture Guide
-
-
-
13
-
-
79956030125
-
Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation
-
doi:10.1145/1966913.1966970
-
Jahid, S., Mittal, P., Borisov, N., 2011. Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation. Proc. 6th ACM Symp. on Information, Computer and Communications Security, p.411-415. [doi:10.1145/1966913.1966970]
-
(2011)
Proc. 6th ACM Symp. on Information, Computer and Communications Security
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
15
-
-
84856335719
-
Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds
-
doi:10.1145/2087522.2087530
-
Kumbhare, A.G., Simmhan, Y., Prasanna, V., 2011. Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds. Proc. 2nd Int. Workshop on Data Intensive Computing in the Clouds, p.31-40. [doi:10.1145/2087522.2087530]
-
(2011)
Proc. 2nd Int. Workshop on Data Intensive Computing in the Clouds
, pp. 31-40
-
-
Kumbhare, A.G.1
Simmhan, Y.2
Prasanna, V.3
-
16
-
-
77955211933
-
Revocation Systems with Very Small Private Keys
-
doi:10.1109/SP.2010.23
-
Lewko, A., Sahai, A., Waters, B., 2010. Revocation Systems with Very Small Private Keys. IEEE Symp. on Security and Privacy, p.273-285. [doi:10.1109/SP.2010.23]
-
(2010)
IEEE Symp. on Security and Privacy
, pp. 273-285
-
-
Lewko, A.1
Sahai, A.2
Waters, B.3
-
17
-
-
77952362084
-
Attribute Based Proxy Re-encryption with Delegating Capabilities
-
doi:10.1145/1533057.1533094
-
Liang, X., Cao, Z., Lin, H., Shao, J., 2009. Attribute Based Proxy Re-encryption with Delegating Capabilities. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.276-286. [doi:10.1145/1533057.1533094]
-
(2009)
Proc. 4th Int. Symp. on Information, Computer, and Communications Security
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
18
-
-
79951935674
-
Unidirectional chosenciphertext secure proxy re-encryption
-
2815852 10.1109/TIT.2011.2104470
-
Libert, B., Vergnaud, D., 2011. Unidirectional chosenciphertext secure proxy re-encryption. IEEE Trans. Inf. Theory, 57(3):1786-1802. [doi:10.1007/978-3-540-78440-1-21]
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.3
, pp. 1786-1802
-
-
Libert, B.1
Vergnaud, D.2
-
19
-
-
84878333979
-
-
Accessed on July 26, 2012
-
OpenSSL, 2012. OpenSSL: Cryptography and SSL/TLS Toolkit. Available from http://www.openssl.org/ [Accessed on July 26, 2012].
-
(2012)
OpenSSL: Cryptography and SSL/TLS Toolkit
-
-
-
20
-
-
51749124474
-
-
Version 1.2 Accessed on June 29, 2012
-
Plank, J.S., Simmerman, S., Schuman, C.D., 2008. Jerasure: a Library in C/C++ Facilitating Erasure Coding for Storage Applications, Version 1.2. Available from http://web.eecs.utk.edu/~plank/plank/papers/CS-08-627.html [Accessed on June 29, 2012].
-
(2008)
Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications
-
-
Plank, J.S.1
Simmerman, S.2
Schuman, C.D.3
-
21
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
1072424 0677.68024 10.1145/62044.62050
-
Rabin, M.O., 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM, 36(2):335-348. [doi:10.1145/62044.62050]
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
23
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Rivest, R., 1997. All-or-nothing encryption and the package transform. LNCS, 1267:210-218. [doi:10.1007/BFb0052348]
-
(1997)
LNCS
, vol.1267
, pp. 210-218
-
-
Rivest, R.1
-
24
-
-
24944554962
-
Fuzzy identity-based encryption
-
2352204
-
Sahai, A., Waters, B., 2005. Fuzzy identity-based encryption. LNCS, 3494:557-557. [doi:10.1007/11426639-27]
-
(2005)
LNCS
, vol.3494
, pp. 557-557
-
-
Sahai, A.1
Waters, B.2
-
25
-
-
77954461010
-
Data Protection in Outsourcing Scenarios: Issues and Directions
-
doi:10.1145/1755688.1755690
-
Samarati, P., di Vimercati, S.D.C., 2010. Data Protection in Outsourcing Scenarios: Issues and Directions. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.1-14. [doi:10.1145/1755688.1755690]
-
(2010)
Proc. 5th ACM Symp. on Information, Computer and Communications Security
, pp. 1-14
-
-
Samarati, P.1
Di Vimercati, S.D.C.2
-
26
-
-
0018545449
-
How to share a secret
-
549252 0414.94021 10.1145/359168.359176
-
Shamir, A., 1979. How to share a secret. Commun. ACM, 22(11):612-613. [doi:10.1145/359168.359176]
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
27
-
-
55449096984
-
Potshards: Secure Long-Term Storage without Encryption
-
Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K., 2007. Potshards: Secure Long-Term Storage without Encryption. Proc. USENIX Annual Technical Conf., p.1-11.
-
(2007)
Proc. USENIX Annual Technical Conf.
, pp. 1-11
-
-
Storer, M.W.1
Greenan, K.M.2
Miller, E.L.3
Voruganti, K.4
-
28
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
10.1109/TDSC.2012.49
-
Tang, Y., Lee, P., Lui, J., Perlman, R., 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Depend. Sec. Comput., 9(6):903-916. [doi:10.1109/TDSC.2012.49]
-
(2012)
IEEE Trans. Depend. Sec. Comput.
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.2
Lui, J.3
Perlman, R.4
-
29
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
2804908
-
Waters, B., 2011. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. LNCS, 6571:53-70. [doi:10.1007/978-3-642-19379-8-4]
-
(2011)
LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
30
-
-
84872004857
-
CL-PRE: A Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud
-
Xu, L., Wu, X., Zhang, X., 2012. CL-PRE: a Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud. Proc. 7th ACM Symp. on Information, Computer and Communications Security, p.1-10.
-
(2012)
Proc. 7th ACM Symp. on Information, Computer and Communications Security
, pp. 1-10
-
-
Xu, L.1
Wu, X.2
Zhang, X.3
-
31
-
-
84868150709
-
Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage
-
doi:10.1109/TrustCom.2012.136
-
Xu, Z., Martin, K.M., 2012. Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. Proc. 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, p.844-849. [doi:10.1109/TrustCom.2012.136]
-
(2012)
Proc. 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications
, pp. 844-849
-
-
Xu, Z.1
Martin, K.M.2
-
32
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing
-
doi:10.1109/INFCOM.2010.5462174
-
Yu, S., Wang, C., Ren, K., Lou, W., 2010a. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. IEEE INFOCOM, p.1-9. [doi:10.1109/INFCOM.2010.5462174]
-
(2010)
IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
33
-
-
77954471010
-
Attribute Based Data Sharing with Attribute Revocation
-
doi:10.1145/1755688.1755720
-
Yu, S., Wang, C., Ren, K., Lou, W., 2010b. Attribute Based Data Sharing with Attribute Revocation. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.261-270. [doi:10.1145/1755688.1755720]
-
(2010)
Proc. 5th ACM Symp. on Information, Computer and Communications Security
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|