-
3
-
-
85139959525
-
-
Netflix on Amazon's Cloud. http://www. Techflash. com/seattle/2010/05/netflix_on_amazon_cloud. html.
-
Netflix on Amazon's Cloud
-
-
-
8
-
-
33745218758
-
Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
-
February
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Trans. Inf. Syst. Secur., 9: 1-30, February 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
10
-
-
0012970453
-
Identity-based Encryption from the Weil Pairing
-
D. Boneh and M. K. Franklin. Identity-based Encryption from the Weil Pairing. In CRYPTO '01.
-
CRYPTO '01
-
-
Boneh, D.1
Franklin, M.K.2
-
12
-
-
0344908112
-
MARKS: Multicast Key Management using Arbitratily Revealed Key Sequences
-
B. Briscoe. MARKS: Multicast Key Management using Arbitratily Revealed Key Sequences. In Proceedings of NGC'99.
-
Proceedings of NGC'99
-
-
Briscoe, B.1
-
13
-
-
85139933620
-
Nark: Receiver-based Multicast Non-repudiation and Key Management
-
B. Briscoe. Nark: Receiver-based Multicast Non-repudiation and Key Management. In Proceedings of EC'99.
-
Proceedings of EC'99
-
-
Briscoe, B.1
-
14
-
-
0032661699
-
Multicast Security: A Taxonomy and Some Efficient Constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In INFOCOM '99.
-
INFOCOM '99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
16
-
-
85139924511
-
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. In Proceedings of CCSW '09.
-
Proceedings of CCSW '09
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
17
-
-
34547273527
-
Attribute-based Encryption for Fine-grained Access Control of Encrypted Data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. of ACM CCS, 2006.
-
(2006)
Proc. of ACM CCS
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
19
-
-
85033460636
-
Plutus: Scalable Secure File Sharing on Untrusted Storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proceedings of FAST, 2003.
-
(2003)
Proceedings of FAST
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
26
-
-
74049152260
-
Hey, You, Get Off of My cloud! Exploring Information Leakage in Third-Party Compute Clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, Get Off of My cloud! Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of CCS, 2009.
-
(2009)
Proceedings of CCS
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
27
-
-
78650161685
-
Towards a Discipline of Mission-aware Cloud Computing
-
R. Sandhu, R. Boppana, R. Krishnan, J. Reich, T. Wolff, and J. Zachry. Towards A Discipline of Mission-aware Cloud Computing. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10.
-
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10
-
-
Sandhu, R.1
Boppana, R.2
Krishnan, R.3
Reich, J.4
Wolff, T.5
Zachry, J.6
-
29
-
-
0018545449
-
How to Share a Secret
-
November
-
A. Shamir. How to Share A Secret. Commun. ACM, 22, November 1979.
-
(1979)
Commun. ACM
, vol.22
-
-
Shamir, A.1
-
30
-
-
85180804257
-
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
-
P. Traynor, K. R. B. Butler, W. Enck, and P. McDaniel. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. In NDSS, 2008.
-
(2008)
NDSS
-
-
Traynor, P.1
Butler, K.R.B.2
Enck, W.3
McDaniel, P.4
-
33
-
-
85139937333
-
Cloudseal: End-to-End Content Protection in Cloud-based Storage and Delivery Services
-
H. Xiong, X. Zhang, W. Zhu, and D. Yao. Cloudseal: End-to-End Content Protection in Cloud-based Storage and Delivery Services. In Proceedings of Securecomm, 2011.
-
(2011)
Proceedings of Securecomm
-
-
Xiong, H.1
Zhang, X.2
Zhu, W.3
Yao, D.4
-
35
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In INFOCOM'10.
-
INFOCOM'10
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
36
-
-
85139975469
-
K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access
-
S. Zarandioon, D. Yao, and V. Ganapathy. K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. In Proceedings of Securecomm, 2011.
-
(2011)
Proceedings of Securecomm
-
-
Zarandioon, S.1
Yao, D.2
Ganapathy, V.3
-
37
-
-
80053516153
-
Enforcing role-based access control for secure data storage in the cloud
-
L. Zhou, V. Varadharajan, and M. Hitchens. Enforcing role-based access control for secure data storage in the cloud. The Computer Journal, 2011.
-
(2011)
The Computer Journal
-
-
Zhou, L.1
Varadharajan, V.2
Hitchens, M.3
-
38
-
-
33846644358
-
Efficient Security Mechanisms for Overlay Multicast based Content Delivery
-
February
-
S. Zhu, C. Yao, D. Liu, S. Setia, and S. Jajodia. Efficient Security Mechanisms for Overlay Multicast based Content Delivery. Comput. Commun., 30: 793-806, February 2007.
-
(2007)
Comput. Commun.
, vol.30
, pp. 793-806
-
-
Zhu, S.1
Yao, C.2
Liu, D.3
Setia, S.4
Jajodia, S.5
|