-
1
-
-
84897914314
-
-
Amazon web services. Retrieved online from
-
Amazon web services. Retrieved online from, http://aws.amazon.com/.
-
-
-
-
2
-
-
68249129760
-
-
[Technical report] EECS Department, University of California Berkeley [Tech. Rep. UCB/EECS-2009-28]
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, and A. Konwinski et al. Above the clouds: a berkeley view of cloud computing [Technical report] 2009 EECS Department, University of California Berkeley [Tech. Rep. UCB/EECS-2009-28]
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
-
3
-
-
77954838345
-
-
[Retrieved online on 28 December 2006 from]
-
M. Arrington Gmail disaster: reports of mass email deletions 2006 [Retrieved online on 28 December 2006 from] http://www.techcrunch.com/2006/12/ 28/gmail-disasterreports-ofmass-email-deletions/
-
(2006)
Gmail Disaster: Reports of Mass Email Deletions
-
-
Arrington, M.1
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing Advances in Cryptology-CRYPTO 2001 Springer 213 229
-
(2001)
Advances in Cryptology-CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
33645998247
-
Hierarchical identity based encryption with constant size ciphertext
-
Springer
-
D. Boneh, X. Boyen, and E.J. Goh Hierarchical identity based encryption with constant size ciphertext Advances in Cryptology-EUROCRYPT 2005 Springer 562 578
-
(2005)
Advances in Cryptology-EUROCRYPT
, pp. 562-578
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
9
-
-
38049078557
-
Multi-authority attribute based encryption
-
Springer
-
M. Chase Multi-authority attribute based encryption Theory of cryptography (TCC) 2007 Springer 515 534
-
(2007)
Theory of Cryptography (TCC)
, pp. 515-534
-
-
Chase, M.1
-
11
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Springer
-
C. Cocks An identity based encryption scheme based on quadratic residues Cryptography and coding (IMACC) 2001 Springer 360 363
-
(2001)
Cryptography and Coding (IMACC)
, pp. 360-363
-
-
Cocks, C.1
-
12
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
VLDB endowment
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd international conference on very large data bases (VLDB) 2007 VLDB endowment 123 134
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB)
, pp. 123-134
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Encryption policies for regulating access to outsourced data ACM Trans Database Syst (TODS) 35 2 2010 12:1 12:46
-
(2010)
ACM Trans Database Syst (TODS)
, vol.35
, Issue.2
, pp. 121-1246
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
15
-
-
84897915572
-
-
Google app engine. Retrieved online from
-
Google app engine. Retrieved online from, http://code.google.com/ appengine/.
-
-
-
-
17
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Springer
-
J. Horwitz, and B. Lynn Toward hierarchical identity-based encryption Advances in Cryptology-EUROCRYPT 2002 Springer 466 481
-
(2002)
Advances in Cryptology-EUROCRYPT
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
21
-
-
84897912387
-
-
Microsoft azure. Retrieved online from
-
Microsoft azure. Retrieved online from, http://www.microsoft.com/azure.
-
-
-
-
27
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer
-
A. Shamir Identity-based cryptosystems and signature schemes Advances in cryptology 1985 Springer 47 53
-
(1985)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
30
-
-
80051514746
-
Achieving fine-grained access control for secure data sharing on cloud servers
-
G. Wang, Q. Liu, and J. Wu Achieving fine-grained access control for secure data sharing on cloud servers Concurrency Comput Pract Exp 23 12 2011 1443 1464
-
(2011)
Concurrency Comput Pract Exp
, vol.23
, Issue.12
, pp. 1443-1464
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
31
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer
-
B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Public key cryptography (PKC) 2011 Springer 53 70
-
(2011)
Public Key Cryptography (PKC)
, pp. 53-70
-
-
Waters, B.1
-
32
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE
-
S. Yu, C. Wang, K. Ren, and W. Lou Achieving secure, scalable, and fine-grained data access control in cloud computing International conference on computer communications (INFOCOM) 2010 IEEE 1 9
-
(2010)
International Conference on Computer Communications (INFOCOM)
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
33
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
ACM
-
S. Yu, C. Wang, K. Ren, and W. Lou Attribute based data sharing with attribute revocation Proceedings of the 5th ACM Symposium on information, computer and communications security (ASIACCS) 2010 ACM 261 270
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|