메뉴 건너뛰기




Volumn 25, Issue 11, 2013, Pages 2602-2614

Privacy preserving policy-based content sharing in public clouds

Author keywords

access control; cloud computing; encryption; Group key management; identity; policy; privacy

Indexed keywords

ATTRIBUTE BASED ACCESS CONTROL; ATTRIBUTE-BASED ENCRYPTIONS; GROUP KEY MANAGEMENT; IDENTITY; KEY MANAGEMENT SCHEMES; PROXY RE ENCRYPTIONS; PUBLIC KEY CRYPTOSYSTEMS; SYMMETRIC-KEY CRYPTOSYSTEM;

EID: 84884783064     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2012.180     Document Type: Article
Times cited : (85)

References (34)
  • 2
    • 84885691129 scopus 로고    scopus 로고
    • "Liberty Alliance," http://www.projectliberty.org/, 2013.
    • (2013) Liberty Alliance
  • 3
    • 84885690593 scopus 로고    scopus 로고
    • "OpenID," http://openid.net/, 2013.
    • (2013)
  • 4
    • 84885684296 scopus 로고    scopus 로고
    • "Microsoft Windows CardSpace," http://msdn.microsoft.com/en-us/ library/aa480189.aspx, 2013.
    • (2013) Microsoft Windows CardSpace
  • 7
    • 33748118047 scopus 로고    scopus 로고
    • Group key management protocols: A novel taxonomy
    • Y. Challal and H. Seba, "Group key Management Protocols: A Novel Taxonomy," Int'l J. Information Technology, vol. 2, no. 2, pp. 105-118, 2006.
    • (2006) Int'l J. Information Technology , vol.2 , Issue.2 , pp. 105-118
    • Challal, Y.1    Seba, H.2
  • 9
  • 11
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • May
    • A. Sherman and D. McGrew, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees," IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, May 2003.
    • (2003) IEEE Trans. Software Eng , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.1    McGrew, D.2
  • 12
    • 0024715386 scopus 로고
    • Secure broadcasting using the secure lock
    • Aug
    • G. Chiou and W. Chen, "Secure Broadcasting Using the Secure Lock," IEEE Trans. Software Eng., vol. 15, no. 8, pp. 929-934, Aug. 1989.
    • (1989) IEEE Trans. Software Eng , vol.15 , Issue.8 , pp. 929-934
    • Chiou, G.1    Chen, W.2
  • 14
    • 51349114288 scopus 로고    scopus 로고
    • A Practical and flexible key management mechanism for trusted collaborative computing
    • Apr
    • X. Zou, Y. Dai, and E. Bertino, "A Practical and Flexible Key Management Mechanism for Trusted Collaborative Computing," Proc. IEEE INFOCOM, pp. 538-546, Apr. 2008.
    • (2008) Proc IEEE INFOCOM , pp. 538-546
    • Zou, X.1    Dai, Y.2    Bertino, E.3
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Comm ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 22
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Advances in Cryptology - CRYPTO 2001
    • D. Naor, M. Naor, and J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '01), pp. 41-62, 2001. (Pubitemid 33317907)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 24
    • 33751513006 scopus 로고    scopus 로고
    • OACerts: Oblivious attribute certificates
    • DOI 10.1109/TDSC.2006.54
    • J. Li and N. Li, "OACerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct.-Dec. 2006. (Pubitemid 44837036)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 340-352
    • Li, J.1    Li, N.2
  • 27
    • 84884751624 scopus 로고    scopus 로고
    • OpenSSL the Open Source Toolkit for SSL/TLS
    • "OpenSSL the Open Source Toolkit for SSL/TLS," http://www. openssl.org/, 2013.
    • (2013)
  • 28
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of XML documents
    • E. Bertino and E. Ferrari, "Secure and Selective Dissemination of XML Documents," ACM Trans. Information System Security, vol. 5, no. 3, pp. 290-331, 2002.
    • (2002) ACM Trans. Information System Security , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 30
    • 70449395944 scopus 로고    scopus 로고
    • Structural signatures for tree data structures
    • A. Kundu and E. Bertino, "Structural Signatures for Tree Data Structures," Proc. VLDB Endowment, vol. 1, no. 1, pp. 138-150, 2008.
    • (2008) Proc. VLDB Endowment , vol.1 , Issue.1 , pp. 138-150
    • Kundu, A.1    Bertino, E.2
  • 33
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," Proc. IEEE Symp. Security and Privacy (SP '07), pp. 321-334, 2007. (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.