-
1
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Communications of the ACM, vol. 53, pp. 50{58, 2010.
-
(2010)
Communications of the ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
84856905411
-
Multi-authority attribute-based encryption with honest-but-curious central authority
-
V Bozovic, D Socek, R Steinwandt, and V. I. Vil-lanyi, "Multi-authority attribute-based encryption with honest-but-curious central authority," Interna-tional Journal of Computer Mathematics, vol. 89, pp. 3, 2012.
-
(2012)
Interna-tional Journal of Computer Mathematics
, vol.89
, pp. 3
-
-
Bozovic, V.1
Socek, D.2
Steinwandt, R.3
Vil-Lanyi, V.I.4
-
6
-
-
80054061336
-
An access control system with time-constraint using support vector machines
-
C. C. Chang, I. C. Lin, and C. T. Liao, "An access control system with time-constraint using support vector machines," International Journal of Network Security, vol. 2, no. 2, pp. 150-159, 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 150-159
-
-
Chang, C.C.1
Lin, I.C.2
Liao, C.T.3
-
8
-
-
70349459300
-
Cloud computing: Distributed internet computing for it and scientific research
-
M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and Athena Vakali, "Cloud computing: Distributed internet computing for it and scientific research," IEEE Internet Computing, vol. 13, pp. 10 -13, 2009.
-
(2009)
IEEE Internet Computing
, vol.13
, pp. 10-13
-
-
Dikaiakos, M.D.1
Katsaros, D.2
Mehra, P.3
Pallis, G.4
Vakali, A.5
-
9
-
-
70350635850
-
A ciphertext-policy attribute-based en-cryption scheme with constant ciphertext length
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext-policy attribute-based en-cryption scheme with constant ciphertext length," in Proceedings of the Information Security Practice and Experience, pp. 13-23, 2009.
-
(2009)
in Proceedings of the Information Security Practice and Experience
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
10
-
-
49049111604
-
Bounded ciphertext policy attribute based encryp-tion
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryp-tion," in Proceedings of the ICALP, pp. 579-591, 2008.
-
(2008)
in Proceedings of the ICALP
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
11
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
-
(2006)
in Proceedings of the 13th ACM conference on Computer and communications security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
76649143738
-
Mediated ciphertext-policy attribute-based encryption and its application
-
of LNCS
-
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, "Mediated ciphertext-policy attribute-based encryption and its application," Information Security Applications, vol. 5932 of LNCS, pp. 309-323, 2009.
-
(2009)
Information Security Applications
, vol.5932
, pp. 309-323
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
14
-
-
70350630621
-
E®-cient and provable secure ciphertext-policy attribute-based encryption schemes
-
L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "E®-cient and provable secure ciphertext-policy attribute-based encryption schemes," in Proceedings of the In-formation Security Practice and Experience, pp. 1-12, 2009.
-
(2009)
in Proceedings of the In-formation Security Practice and Experience
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.3
Jonker, W.4
-
16
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
of LNCS
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," Advances in Cryptology V EU-ROCRYPT, vol. 6110 of LNCS, pp. 62-91, 2010.
-
(2010)
Advances in Cryptology V EU-ROCRYPT
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
17
-
-
70350407157
-
Privacy-aware attribute-based encryption with user accountability
-
of LNCS
-
J. Li, K. Ren, B. Zhu, and Z. Wan, "Privacy-aware attribute-based encryption with user accountability," Information on Security, vol. 5735 of LNCS, pp. 347-362, 2009.
-
(2009)
Information on Security
, vol.5735
, pp. 347-362
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.4
-
18
-
-
77952407083
-
Provably se-cure and efficient bounded ciphertext policy attribute based encryption
-
X. Liang, Z. Cao, H. Lin, and D. Xing, "Provably se-cure and efficient bounded ciphertext policy attribute based encryption," in Proceedings of the 4th Inter-national Symposium on Information, Computer, and Communications Security, pp. 343-352, 2009.
-
(2009)
in Proceedings of the 4th Inter-national Symposium on Information Computer, and Communications Security,
, pp. 343-352
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Xing, D.4
-
19
-
-
58749115565
-
Secure threshold multi authority attribute based encryption without a central authority
-
H Lin, Z Cao, X Liang, and J Shao, "Secure threshold multi authority attribute based encryption without a central authority," in Proceedings of the Cryptology in India-INDOCRYPT, pp. 426-436, 2008.
-
(2008)
in Proceedings of the Cryptology in India-INDOCRYPT
, pp. 426-436
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
20
-
-
84875263535
-
An expres-sive decentralizing KP-ABE scheme with constant-size ciphertext
-
Q Li, H. Xiong, F. Zhang, and S. Zeng, "An expres-sive decentralizing KP-ABE scheme with constant-size ciphertext," International Journal of Network Security, vol. 15, no. 3, pp. 161-170, 2013.
-
(2013)
International Journal of Network Security
, vol.15
, Issue.3
, pp. 161-170
-
-
Li, Q.1
Xiong, H.2
Zhang, F.3
Zeng, S.4
-
21
-
-
84863163897
-
Reli-able re-encryption in unreliable clouds
-
Q. Liu, C. C. Tan, J. Wu, and GuojunWang, "Reli-able re-encryption in unreliable clouds," in Proceed-ings of the IEEE Global Telecommunications Confer-ence, pp. 1-5, 2011.
-
(2011)
in Proceed-ings of the IEEE Global Telecommunications Confer-ence
, pp. 1-5
-
-
Liu, Q.1
Tan, C.C.2
Wu, J.3
Wang, G.4
-
22
-
-
84889096845
-
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
-
In Press
-
Q. Liu, G. Wang, and J. Wu, "Time-based proxy re-encryption scheme for secure data sharing in a cloud environment," Information Sciences. In Press, 2012.
-
(2012)
Information Sciences.
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
23
-
-
77952325912
-
Dis-tributed attribute-based encryption
-
S. Muller, S. Katzenbeisser, and C. Eckert, "Dis-tributed attribute-based encryption," in Proceedings of ICISC, pp. 20-36, 2008.
-
(2008)
in Proceedings of ICISC
, pp. 20-36
-
-
Muller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
24
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures," in Proceedings of the Ap-plied Cryptography and Network Security, pp. 111-129, 2008.
-
(2008)
in Proceedings of the Ap-plied Cryptography and Network Security
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
25
-
-
34547269639
-
Using threshold attribute-based encryption for practical biometric-based access control
-
D. Nali, C. Adams, and A. Miri, "Using threshold attribute-based encryption for practical biometric-based access control," International Journal of Net-work Security, vol. 1, no. 3, pp. 173-182, 2005.
-
(2005)
International Journal of Net-work Security
, vol.1
, Issue.3
, pp. 173-182
-
-
Nali, D.1
Adams, C.2
Miri, A.3
-
26
-
-
74049120601
-
Attribute-based encryption with non-monotonic access struc-tures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access struc-tures," in Proceedings of the 14th ACM conference on Computer and communications security, pp. 195-203, 2007.
-
(2007)
in Proceedings of the 14th ACM conference on Computer and communications security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
28
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
79959612798
-
Attribute-based encryption schemes
-
J. S. Su, D. Cao, X. F. Wang, Y. P. Su, and Q. L. Hu, "Attribute-based encryption schemes," Journal of Software, vol. 6, pp. 1299-1315, 2012.
-
(2012)
Journal of Software
, vol.6
, pp. 1299-1315
-
-
Su, J.S.1
Cao, D.2
Wang, X.F.3
Su, Y.P.4
Hu, Q.L.5
-
30
-
-
80355141146
-
Verifiable attribute-based en-cryption
-
Q. Tang and D. Ji, "Verifiable attribute-based en-cryption," International Journal of Network Secu-rity, vol. 10, no. 2, pp. 114-120, 2010.
-
(2010)
International Journal of Network Secu-rity
, vol.10
, Issue.2
, pp. 114-120
-
-
Tang, Q.1
Ji, D.2
-
31
-
-
78649850078
-
A novel key management scheme for dynamic access control in a hierarchy
-
S. F. Tzeng, C. C. Lee, and T. C. Lin, "A novel key management scheme for dynamic access control in a hierarchy," International Journal of Network Secu-rity, vol. 12, no. 3, pp. 178-180, 2011.
-
(2011)
International Journal of Network Secu-rity
, vol.12
, Issue.3
, pp. 178-180
-
-
Tzeng, S.F.1
Lee, C.C.2
Lin, T.C.3
-
32
-
-
78649998200
-
Hierachical attibute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, and J.Wu, "Hierachical attibute-based encryption for fine-grained access control in cloud storage services," in Proceedings of the 17th ACM conference on Computer and communications security, pp. 735-737, 2010.
-
(2010)
in Proceedings of the 17th ACM conference on Computer and communications security
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
33
-
-
79960839401
-
Hierarchical attribute-based encryption and scalable user revoca-tion for sharing data in cloud servers
-
G.Wang, Q. Liu, J.Wu, and M. Guo, "Hierarchical attribute-based encryption and scalable user revoca-tion for sharing data in cloud servers," Computer & Security, vol. 30, pp. 320-331, 2011.
-
(2011)
Computer & Security
, vol.30
, pp. 320-331
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
34
-
-
79952521560
-
Ciphertext-policy attribute-based en-cryption: An expressive, efficient, and provably se-cure realization
-
B. Waters, "Ciphertext-policy attribute-based en-cryption: An expressive, efficient, and provably se-cure realization," Public Key Cryptography V PKC, vol. 6571 of LNCS, pp. 53-70, 2011.
-
(2011)
Public Key Cryptography V PKC of LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
35
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proceedings of IEEE INFO-COM, pp. 534-542, 2010.
-
(2010)
in Proceedings of IEEE INFO-COM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
36
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proceedings of the 5th ACM Symposium on Infor-mation, Computer and Communications Security, pp. 261-270, 2010.
-
(2010)
in Proceedings of the 5th ACM Symposium on Infor-mation Computer and Communications Security,
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|