메뉴 건너뛰기




Volumn , Issue , 2013, Pages 477-484

Hierarchical attribute-based access control with authentication for outsourced data in cloud computing

Author keywords

ABS; Access Control; CP ABE; XACML

Indexed keywords

ABS; ATTRIBUTE BASED ACCESS CONTROL; ATTRIBUTE-BASED SIGNATURES; ATTRIBUTED-BASED ENCRYPTIONS; CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTIONS; CP-ABE; EXTENSIBLE ACCESS CONTROL MARKUP LANGUAGES; XACML;

EID: 84893461004     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2013.60     Document Type: Conference Paper
Times cited : (44)

References (23)
  • 3
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • M. Chase. Multi-authority attribute based encryption. Theory of Cryptography, pages 515-534, 2007.
    • (2007) Theory of Cryptography , pp. 515-534
    • Chase, M.1
  • 10
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • J. Hur and D.K. Noh. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7):1214-1221, 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Noh, D.K.2
  • 15
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Advances in Cryptology, pages 41-62, 2001.
    • (2001) Advances in Cryptology , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 17
    • 33645998872 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai and B. Waters. Fuzzy identity-based encryption. Advances in Cryptology, pages 557-557, 2005.
    • (2005) Advances in Cryptology , pp. 557-557
    • Sahai, A.1    Waters, B.2
  • 18
    • 84863392301 scopus 로고    scopus 로고
    • Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • Z. Wan, J. Liu, and R.H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Transactions on Information Forensics and Security, 7(2):743-754, 2012.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 20
    • 78651351023 scopus 로고    scopus 로고
    • A hierarchical access control scheme in cloud using hhecc
    • Yingjie Xia, Li Kuang, and Mingzhe Zhu. A hierarchical access control scheme in cloud using hhecc. Information Technology Journal, 9(8):1598-1606, 2010.
    • (2010) Information Technology Journal , vol.9 , Issue.8 , pp. 1598-1606
    • Xia, Y.1    Kuang, L.2    Zhu, M.3
  • 21
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of IEEE INFOCOM, pages 1-9, 2010.
    • (2010) Proceedings of IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 23
    • 79956336417 scopus 로고    scopus 로고
    • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
    • Fangming Zhao, Takashi Nishide, and Kouichi Sakurai. Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. Information Security Practice and Experience, pages 83-97, 2011.
    • (2011) Information Security Practice and Experience , pp. 83-97
    • Zhao, F.1    Nishide, T.2    Sakurai, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.