메뉴 건너뛰기




Volumn 39, Issue PARTA, 2013, Pages 47-63

Enforcing dynamic write privileges in data outsourcing

Author keywords

Data integrity; Data outsourcing; Data protection; Policy updates; Write authorization enforcement

Indexed keywords

AUTHORIZED USERS; DATA INTEGRITY; DATA OUTSOURCING; DATA PROTECTION; KEY DERIVATIONS; OUTSOURCED DATUM; SELECTIVE ENCRYPTION; WRITE AUTHORIZATION ENFORCEMENT;

EID: 84888305233     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.01.008     Document Type: Article
Times cited : (33)

References (29)
  • 2
    • 33745793594 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • Alexandria, VA, USA
    • M. Atallah, K. Frikken, and M. Blanton Dynamic and efficient key management for access hierarchies Proc. of CCS 2005 Alexandria, VA, USA
    • (2005) Proc. of CCS
    • Atallah, M.1    Frikken, K.2    Blanton, M.3
  • 4
    • 0002757750 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Santa Barbara, CA, USA
    • M. Bellare, R. Canetti, and H. Krawczyk Keying hash functions for message authentication Proc. of CRYPTO 1996 Santa Barbara, CA, USA
    • (1996) Proc. of CRYPTO
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 11
    • 84888305521 scopus 로고    scopus 로고
    • Authenticated relational tables and authenticated skip lists
    • Redondo Beach, CA, USA
    • G. Di Battista, and B. Palazzi Authenticated relational tables and authenticated skip lists Proc. of DBSec 2007 Redondo Beach, CA, USA
    • (2007) Proc. of DBSec
    • Di Battista, G.1    Palazzi, B.2
  • 12
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, WI, USA
    • H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li Executing SQL over encrypted data in the database-service-provider model Proc. of SIGMOD 2002 Madison, WI, USA
    • (2002) Proc. of SIGMOD
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 13
    • 84876800484 scopus 로고    scopus 로고
    • Fault tolerance management in cloud computing: A system-level perspective
    • R. Jhawar, V. Piuri, and M. Santambrogio Fault tolerance management in cloud computing: a system-level perspective IEEE Systems Journal pp 99 2012
    • (2012) IEEE Systems Journal , vol.PP , Issue.99
    • Jhawar, R.1    Piuri, V.2    Santambrogio, M.3
  • 14
    • 84874048096 scopus 로고    scopus 로고
    • Supporting security requirements for resource management in cloud computing
    • Paphos, Cyprus
    • R. Jhawar, V. Piuri, and P. Samarati Supporting security requirements for resource management in cloud computing Proc. of CSE 2012 Paphos, Cyprus
    • (2012) Proc. of CSE
    • Jhawar, R.1    Piuri, V.2    Samarati, P.3
  • 15
    • 0001263548 scopus 로고
    • A certified digital signature
    • Santa Barbara, CA, USA
    • R. Merkle A certified digital signature Proc. of CRYPTO 1989 Santa Barbara, CA, USA
    • (1989) Proc. of CRYPTO
    • Merkle, R.1
  • 16
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Berlin, Germany
    • G. Miklau, and D. Suciu Controlling access to published data using cryptography Proc. of VLDB 2003 Berlin, Germany
    • (2003) Proc. of VLDB
    • Miklau, G.1    Suciu, D.2
  • 17
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • DOI 10.1145/1149976.1149977
    • G. Miklau, and D. Suciu Controlling access to published data using cryptography Proc. of VLDB 2003 Berlin, Germany (Pubitemid 44232391)
    • (2006) ACM Transactions on Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 18
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • Baltimore, MA, USA
    • H. Pang, A. Jain, K. Ramamritham, and K. Tan Verifying completeness of relational query results in data publishing Proc. of SIGMOD 2005 Baltimore, MA, USA
    • (2005) Proc. of SIGMOD
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.4
  • 19
    • 84888295277 scopus 로고    scopus 로고
    • Privacy enhanced access control for outsourced data sharing
    • Bonaire
    • M. Raykova, H. Zhao, and S. Bellovin Privacy enhanced access control for outsourced data sharing Proc. of FC 2012 Bonaire
    • (2012) Proc. of FC
    • Raykova, M.1    Zhao, H.2    Bellovin, S.3
  • 20
    • 84863686587 scopus 로고    scopus 로고
    • Privacy preserving access control with authentication for securing data in clouds
    • Ottawa, Canada
    • S. Ruj, M. Stojmenovic, and A. Nayak Privacy preserving access control with authentication for securing data in clouds Proc. of CCGrid 2012 Ottawa, Canada
    • (2012) Proc. of CCGrid
    • Ruj, S.1    Stojmenovic, M.2    Nayak, A.3
  • 21
    • 77954461010 scopus 로고    scopus 로고
    • Data protection in outsourcing scenarios: Issues and directions
    • Beijing, China
    • P. Samarati, and S. De Capitani di Vimercati Data protection in outsourcing scenarios: Issues and directions Proc. of ASIACCS 2010 Beijing, China
    • (2010) Proc. of ASIACCS
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 22
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • Trondheim, Norway
    • R. Sion Query execution assurance for outsourced databases Proc. of VLDB 2005 Trondheim, Norway
    • (2005) Proc. of VLDB
    • Sion, R.1
  • 23
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted XML databases
    • Seoul, Korea
    • H. Wang, and L.V.S. Lakshmanan Efficient secure query evaluation over encrypted XML databases Proc. of VLDB 2006 Seoul, Korea
    • (2006) Proc. of VLDB
    • Wang, H.1    Lakshmanan, L.V.S.2
  • 24
    • 70349251911 scopus 로고    scopus 로고
    • Dual encryption for query integrity assurance
    • Napa Valley, CA, USA
    • H. Wang, J. Yin, C. Perng, and P. Yu Dual encryption for query integrity assurance Proc. of CIKM 2008 Napa Valley, CA, USA
    • (2008) Proc. of CIKM
    • Wang, H.1    Yin, J.2    Perng, C.3    Yu, P.4
  • 25
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE TPDS 23 2012 1467 1479
    • (2012) IEEE TPDS , vol.23 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 26
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou Privacy-preserving public auditing for secure cloud storage IEEE TC 62 2012 362 375
    • (2012) IEEE TC , vol.62 , pp. 362-375
    • Wang, C.1    Chow, S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 27
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • Vienna, Austria
    • M. Xie, H. Wang, J. Yin, and X. Meng Integrity auditing of outsourced data Proc. of VLDB 2007 Vienna, Austria
    • (2007) Proc. of VLDB
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 28
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • San Diego, CA, USA
    • S. Yu, C. Wang, K. Ren, and W. Lou Achieving secure, scalable, and fine-grained data access control in cloud computing Proc. of INFOCOM 2010 San Diego, CA, USA
    • (2010) Proc. of INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 29
    • 84976588717 scopus 로고    scopus 로고
    • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
    • Guangzhou, China
    • F. Zhao, T. Nishide, and K. Sakurai Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems Proc. of ISPEC 2011 Guangzhou, China
    • (2011) Proc. of ISPEC
    • Zhao, F.1    Nishide, T.2    Sakurai, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.