-
2
-
-
84856905411
-
Multi-authority attribute-based encryption with honest-butcurious central authority
-
V. Bǒzović, D. Socek, R. Steinwandt, and V.I. Villányi. Multi-authority attribute-based encryption with honest-butcurious central authority. International Journal of Computer Mathematics, 89(3):268-283, 2012.
-
(2012)
International Journal of Computer Mathematics
, vol.89
, Issue.3
, pp. 268-283
-
-
Bǒzović, V.1
Socek, D.2
Steinwandt, R.3
Villányi, V.I.4
-
3
-
-
38049078557
-
Multi-authority attribute based encryption
-
M. Chase. Multi-authority attribute based encryption. Theory of Cryptography, pages 515-534, 2007.
-
(2007)
Theory of Cryptography
, pp. 515-534
-
-
Chase, M.1
-
5
-
-
33244469997
-
Key management for multi-user encrypted databases
-
E. Damiani, S. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Key management for multi-user encrypted databases. In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, pages 74-83, 2005.
-
(2005)
Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
, pp. 74-83
-
-
Damiani, E.1
Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S.D.C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: management of access control evolution on outsourced data. In Proceedings of the 33rd International Conference on Very Large Data Bases, pages 123-134, 2007.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 89-98, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
J. Hur and D.K. Noh. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7):1214-1221, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
11
-
-
76649143738
-
Mediated ciphertext-policy attribute-based encryption and its application
-
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker. Mediated ciphertext-policy attribute-based encryption and its application. Information Security Applications, pages 309-323, 2009.
-
(2009)
Information Security Applications
, pp. 309-323
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
12
-
-
79956030125
-
Easier: Encryption-based access control in social networks with efficient revocation
-
S. Jahid, P. Mittal, and N. Borisov. Easier: encryption-based access control in social networks with efficient revocation. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 411-415, 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
13
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pages 29-42, 2003.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
15
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Advances in Cryptology, pages 41-62, 2001.
-
(2001)
Advances in Cryptology
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
16
-
-
84863686587
-
Privacy preserving access control with authentication for securing data in clouds
-
Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak. Privacy preserving access control with authentication for securing data in clouds. In The 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pages 556-563, 2012.
-
(2012)
The 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
, pp. 556-563
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
18
-
-
84863392301
-
Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Z. Wan, J. Liu, and R.H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Transactions on Information Forensics and Security, 7(2):743-754, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
19
-
-
74049154660
-
Secure and efficient access to outsourced data
-
W. Wang, Z. Li, R. Owens, and B. Bhargava. Secure and efficient access to outsourced data. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pages 55-66, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
20
-
-
78651351023
-
A hierarchical access control scheme in cloud using hhecc
-
Yingjie Xia, Li Kuang, and Mingzhe Zhu. A hierarchical access control scheme in cloud using hhecc. Information Technology Journal, 9(8):1598-1606, 2010.
-
(2010)
Information Technology Journal
, vol.9
, Issue.8
, pp. 1598-1606
-
-
Xia, Y.1
Kuang, L.2
Zhu, M.3
-
21
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of IEEE INFOCOM, pages 1-9, 2010.
-
(2010)
Proceedings of IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
22
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 261-270, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
23
-
-
79956336417
-
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
-
Fangming Zhao, Takashi Nishide, and Kouichi Sakurai. Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. Information Security Practice and Experience, pages 83-97, 2011.
-
(2011)
Information Security Practice and Experience
, pp. 83-97
-
-
Zhao, F.1
Nishide, T.2
Sakurai, K.3
|