-
1
-
-
84863686587
-
Privacy preserving access control with authentication for securing data in clouds
-
S. Ruj, M. Stojmenovic, and A. Nayak, Privacy Preserving Access Control with Authentication for Securing Data in Clouds, Proc. IEEE/ACM Int'l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
-
(2012)
Proc. IEEE/ACM Int'l Symp. Cluster, Cloud and Grid Computing
, pp. 556-563
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
2
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
Ar-June
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
-
(2012)
IEEE Trans. Services Computing
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
3
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy Keyword Search Over Encrypted Data in Cloud Computing, Proc. IEEE INFOCOM, pp. 441-445, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 441-445
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
5
-
-
71749113079
-
Identity-based authentication for cloud computing
-
H. Li, Y. Dai, L. Tian, and H. Yang, Identity-Based Authentication for Cloud Computing, Proc. First Int'l Conf. Cloud Computing (CloudCom), pp. 157-166, 2009.
-
(2009)
Proc. First Int'l Conf. Cloud Computing (CloudCom)
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
6
-
-
77649261628
-
A fully homomorphic encryption scheme
-
Stanford Univ.
-
C. Gentry, A Fully Homomorphic Encryption Scheme, PhD dissertation, Stanford Univ., http://www.crypto.stanford.edu/craig, 2009.
-
(2009)
PhD Dissertation
-
-
Gentry, C.1
-
7
-
-
77954749319
-
Token-based cloud computing
-
A.-R. Sadeghi, T. Schneider, and M. Winandy, Token-Based Cloud Computing, Proc. Third Int'l Conf. Trust and Trustworthy Computing (TRUST), pp. 417-429, 2010.
-
(2010)
Proc. Third Int'l Conf. Trust and Trustworthy Computing (TRUST)
, pp. 417-429
-
-
Sadeghi, A.-R.1
Schneider, T.2
Winandy, M.3
-
8
-
-
84863704473
-
Trustcloud: A framework for accountability and trust in cloud computing
-
R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B.S. Lee, Trustcloud: A Framework for Accountability and Trust in Cloud Computing, HP Technical Report HPL-2011-38, http://www.hpl.hp.com/ techreports/2011/HPL-2011-38.html, 2013.
-
(2013)
HP Technical Report HPL-2011-2038
-
-
Ko, R.K.L.1
Jagadpramana, P.2
Mowbray, M.3
Pearson, S.4
Kirchberg, M.5
Liang, Q.6
Lee, B.S.7
-
9
-
-
77954472312
-
Secure provenance: The essential of bread and butter of data forensics in cloud computing
-
R. Lu, X. Lin, X. Liang, and X. Shen, Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 282-292, 2010.
-
(2010)
Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS)
, pp. 282-292
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
11
-
-
77953350247
-
Adding attributes to role-based access control
-
June
-
D.R. Kuhn, E.J. Coyne, and T.R. Weil, Adding Attributes to Role-Based Access Control, IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010.
-
(2010)
IEEE Computer
, vol.43
, Issue.6
, pp. 79-81
-
-
Kuhn, D.R.1
Coyne, E.J.2
Weil, T.R.3
-
12
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
M. Li, S. Yu, K. Ren, and W. Lou, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings, Proc. Sixth Int'l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89-106, 2010.
-
(2010)
Proc. Sixth Int'l ICST Conf. Security and Privacy in Comm. Networks (SecureComm)
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
13
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, Attribute Based Data Sharing with Attribute Revocation, Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010.
-
(2010)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS)
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
14
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, and J. Wu, Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services, Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security (CCS)
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
15
-
-
79956336417
-
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
-
F. Zhao, T. Nishide, and K. Sakurai, Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems, Proc. Seventh Int'l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011.
-
(2011)
Proc. Seventh Int'l Conf. Information Security Practice and Experience (ISPEC)
, pp. 83-97
-
-
Zhao, F.1
Nishide, T.2
Sakurai, K.3
-
16
-
-
84856190480
-
Dacc: Distributed access control in clouds
-
S. Ruj, A. Nayak, and I. Stojmenovic, DACC: Distributed Access Control in Clouds, Proc. IEEE 10th Int'l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011.
-
(2011)
Proc. IEEE 10th Int'l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom)
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
17
-
-
85194053944
-
-
http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf, 2013.
-
(2013)
-
-
-
18
-
-
85194044443
-
-
http://securesoftwaredev.com/2012/08/20/xacml-in-the-cloud, 2013.
-
(2013)
-
-
-
19
-
-
79956030125
-
Easier: Encryption-based access control in social networks with efficient revocation
-
S. Jahid, P. Mittal, and N. Borisov, EASiER: Encryption-Based Access Control in Social Networks with Efficient Revocation, Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2011.
-
(2011)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS)
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
20
-
-
84946833891
-
How to Leak a Secret
-
Advances in Cryptology - ASIACRYPT 2001
-
R.L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), pp. 552-565, 2001. (Pubitemid 33371206)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
24
-
-
79951783454
-
Attribute-based signatures
-
H.K. Maji, M. Prabhakaran, and M. Rosulek, Attribute-Based Signatures, Topics in Cryptology-CT-RSA, vol. 6558, pp. 376-392, 2011.
-
(2011)
Topics in Cryptology-CT-RSA
, vol.6558
, pp. 376-392
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
25
-
-
0003745894
-
Secure schemes for secret sharing and key distribution
-
Technion, Haifa
-
A. Beimel, Secure Schemes for Secret Sharing and Key Distribution, PhD thesis, Technion, Haifa, 1996.
-
(1996)
PhD Thesis
-
-
Beimel, A.1
-
26
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Proc. Ann. Int'l Conf. Advances in Cryptology (EUROCRYPT), pp. 457-473, 2005. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
27
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data, Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
28
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007. (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
29
-
-
77952407083
-
Provably secure and efficient bounded ciphertext policy attribute based encryption
-
X. Liang, Z. Cao, H. Lin, and D. Xing, Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption, Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp 343-352, 2009.
-
(2009)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS)
, pp. 343-352
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Xing, D.4
-
31
-
-
58749115565
-
Secure threshold multi-authority attribute based encryption without a central authority
-
H. Lin, Z. Cao, X. Liang, and J. Shao, Secure Threshold Multi-Authority Attribute Based Encryption without a Central Authority, Proc. Progress in Cryptology Conf. (INDOCRYPT), pp. 426-436, 2008.
-
(2008)
Proc. Progress in Cryptology Conf. (INDOCRYPT)
, pp. 426-436
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
32
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
M. Chase and S.S.M. Chow, Improving Privacy and Security in Multi-Authority Attribute-Based Encryption, Proc. ACM Conf. Computer and Comm. Security, pp. 121-130, 2009.
-
(2009)
Proc. ACM Conf. Computer and Comm. Security
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.M.2
-
34
-
-
85045009877
-
DAC-MACS: Effective data access control for multi-authority cloud storage systems
-
K. Yang, X. Jia, and K. Ren, DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems, IACR Cryptology ePrint Archive, p. 419, 2012.
-
(2014)
SpringerBriefs in Computer Science
, pp. 59-83
-
-
Yang, K.1
Jia, X.2
-
36
-
-
85194048740
-
-
http://crypto.stanford.edu/pbc/, 2013.
-
(2013)
-
-
-
38
-
-
74049154660
-
Secure and efficient access to outsourced data
-
W. Wang, Z. Li, R. Owens, and B. Bhargava, Secure and Efficient Access to Outsourced Data, Proc. ACM Cloud Computing Security Workshop (CCSW), 2009.
-
(2009)
Proc. ACM Cloud Computing Security Workshop (CCSW)
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
39
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
July
-
J. Hur and D. Kun Noh, Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011. Canada
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Kun Noh, D.2
|