-
1
-
-
84863392301
-
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Z. Wan, J. Liu, R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing, " IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743-754, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
2
-
-
80053323280
-
Recent advances in cloud security
-
J. Wu, Q. Shen, T. Wang, J. Zhu, J. Zhang, "Recent advances in cloud security, " Journal of Computers, vol. 6, no. 10, pp. 2156-2163, 2011.
-
(2011)
Journal of Computers
, vol.6
, Issue.10
, pp. 2156-2163
-
-
Wu, J.1
Shen, Q.2
Wang, T.3
Zhu, J.4
Zhang, J.5
-
3
-
-
56649109687
-
Trusted digital rights management protocol supporting for time and space constraint
-
Z. Ma, K. Fan, M. Chen, Y. Yang, X. Niu, "Trusted digital rights management protocol supporting for time and space constraint, " Journal on Communications, vol. 29, no. 10, pp. 153-164, 2008.
-
(2008)
Journal on Communications
, vol.29
, Issue.10
, pp. 153-164
-
-
Ma, Z.1
Fan, K.2
Chen, M.3
Yang, Y.4
Niu, X.5
-
4
-
-
84860286034
-
An efficient access control scheme for outsourced data
-
X. Wang, Y. Lin, "An efficient access control scheme for outsourced data, " Journal of Computers, vol. 7, no. 4, pp. 918-922, 2012.
-
(2012)
Journal of Computers
, vol.7
, Issue.4
, pp. 918-922
-
-
Wang, X.1
Lin, Y.2
-
5
-
-
84874109689
-
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
-
D. Koo, J. Hur, H. Yoon, "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, " Computers & Electrical Engineering, vol. 39, no. 1, pp. 34-46, 2013.
-
(2013)
Computers & Electrical Engineering
, vol.39
, Issue.1
, pp. 34-46
-
-
Koo, D.1
Hur, J.2
Yoon, H.3
-
6
-
-
84863291993
-
An efficient identity-based broadcast signcryption scheme
-
M. Luo, C. Zou, J. Xu, "An efficient identity-based broadcast signcryption scheme, " Journal of Software, vol. 7, no. 2, pp. 366-373, 2012.
-
(2012)
Journal of Software
, vol.7
, Issue.2
, pp. 366-373
-
-
Luo, M.1
Zou, C.2
Xu, J.3
-
7
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
J. Hur, D. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems, " IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.2
-
10
-
-
77953963918
-
Privacy-preserving DRM
-
R. Perlman, C. Kaufman, R. Perlner, "Privacy-preserving DRM, " Proceedings of the 9th Symposium on Identity and Trust on the Internet, pp. 69-83, 2010.
-
(2010)
Proceedings of the 9th Symposium on Identity and Trust on the Internet
, pp. 69-83
-
-
Perlman, R.1
Kaufman, C.2
Perlner, R.3
-
11
-
-
77952416464
-
A new DRM architecture with strong enforcement
-
S. Muller, S. Katzenbeisser, "A new DRM architecture with strong enforcement, " Proceedings of the 5th International Conference on Availability, Reliability, and Security, pp. 397-403, 2010.
-
(2010)
Proceedings of the 5th International Conference on Availability, Reliability, and Security
, pp. 397-403
-
-
Muller, S.1
Katzenbeisser, S.2
-
12
-
-
79960839401
-
Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers
-
G. Wang, Q. Liu, J. Wu, M. Guo, "Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers, " Computers and Security, vol. 30, no. 5, pp. 320-331, 2011.
-
(2011)
Computers and Security
, vol.30
, Issue.5
, pp. 320-331
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
13
-
-
84889096845
-
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
-
Q. Liu, G. Wang, J. Wu, "Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, " Information Sciences, 2012.
-
(2012)
Information Sciences
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
14
-
-
84860617727
-
An efficient attribute based encryption scheme with revocation for outsourced data sharing control
-
M. Yang, F. Liu, J. Han, Z. Wang, "An efficient attribute based encryption scheme with revocation for outsourced data sharing control, " Proceedings of 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 516-520, 2011.
-
(2011)
Proceedings of 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
, pp. 516-520
-
-
Yang, M.1
Liu, F.2
Han, J.3
Wang, Z.4
-
15
-
-
76649143738
-
Mediated ciphertext-policy attribute-based encryption and its application
-
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, W. Jonker, "Mediated ciphertext-policy attribute-based encryption and its application, " Proceedings of the 10th International Workshop on Information Security Applications, pp. 309-323, 2009.
-
(2009)
Proceedings of the 10th International Workshop on Information Security Applications
, pp. 309-323
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
16
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing, " Proceedings of the IEEE INFOCOM 2010, pp. 1-9, 2010.
-
(2010)
Proceedings of the IEEE INFOCOM 2010
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|