-
1
-
-
34547273527
-
Attributebased encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attributebased encryption for fine-grained access control of encrypted data", in ACM Conference on Computer and Communications Security, 2006, pp. 89-98.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
2
-
-
84881006002
-
Action-based multilevel access control for structured document
-
J. Xiong, Z. Yao, J. Ma, F. Li, and Q. Li, "Action-based multilevel access control for structured document", Journal of Computer Research and Development, vol. 50, no. 7, pp. 1399-1408, 2013.
-
(2013)
Journal of Computer Research and Development
, vol.50
, Issue.7
, pp. 1399-1408
-
-
Xiong, J.1
Yao, Z.2
Ma, J.3
Li, F.4
Li, Q.5
-
4
-
-
84885890734
-
Fade: Secure overlay cloud storage with file assured deletion
-
Y. Tang, P. P. Lee, J. C. Lui, and R. Perlman, "Fade: Secure overlay cloud storage with file assured deletion", Security and Privacy in Communication Networks, SecureComm 2010, vol. 50, pp. 380-397, 2010.
-
(2010)
Security and Privacy in Communication Networks, SecureComm 2010
, vol.50
, pp. 380-397
-
-
Tang, Y.1
Lee, P.P.2
Lui, J.C.3
Perlman, R.4
-
5
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
Y. Tang, P. P. Lee, J. C. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion", Dependable and Secure Computing, IEEE Transactions on, vol. 9, no. 6, pp. 903-916, 2012.
-
(2012)
Dependable and Secure Computing, IEEE Transactions On
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.2
Lui, J.C.3
Perlman, R.4
-
6
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, "Vanish: Increasing data privacy with self-destructing data", in Proc. of the 18th USENIX Security Symposium, 2009, pp. 299-315.
-
(2009)
Proc. of the 18th USENIX Security Symposium
, pp. 299-315
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
7
-
-
84870295829
-
A secure self-destructing scheme for electronic data
-
G. Wang, F. Yue, and Q. Liu, "A secure self-destructing scheme for electronic data", J. Comput. Syst. Sci., vol. 79, no. 2, pp. 279-290, 2013.
-
(2013)
J. Comput. Syst. Sci.
, vol.79
, Issue.2
, pp. 279-290
-
-
Wang, G.1
Yue, F.2
Liu, Q.3
-
8
-
-
84890096552
-
A secure document self-destruction scheme with identity based encryption
-
IEEE
-
J. Xiong, Z. Yao, J. Ma, X. Liu, and Q. Li, "A secure document self-destruction scheme with identity based encryption", in Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013. IEEE, 2013, pp. 239-243.
-
(2013)
Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
, pp. 239-243
-
-
Xiong, J.1
Yao, Z.2
Ma, J.3
Liu, X.4
Li, Q.5
-
10
-
-
76349111100
-
Research on secure destruction of digital information
-
IEEE
-
H. Dong, S. Kun, and C. Yu, "Research on secure destruction of digital information", in Apperceiving Computing and Intelligence Analysis, 2009. ICACIA 2009. International Conference on. IEEE, 2009, pp. 356-359.
-
(2009)
Apperceiving Computing and Intelligence Analysis, 2009. ICACIA 2009. International Conference On
, pp. 356-359
-
-
Dong, H.1
Kun, S.2
Yu, C.3
-
11
-
-
51949085264
-
Secure deletion of confidential data in consumer electronics
-
IEEE
-
K. Sun, J. Choi, D. Lee, and S. H. Noh, "Secure deletion of confidential data in consumer electronics", in Consumer Electronics, 2008. ICCE 2008. Digest of Technical Papers. International Conference on. IEEE, 2008, pp. 385-386.
-
(2008)
Consumer Electronics, 2008. ICCE 2008. Digest of Technical Papers. International Conference On
, pp. 385-386
-
-
Sun, K.1
Choi, J.2
Lee, D.3
Noh, S.H.4
-
12
-
-
36349001779
-
A hybrid pki-ibc based ephemerizer system
-
S. Nair, M. Dashti, B. Crispo, and A. Tanenbaum, "A hybrid pki-ibc based ephemerizer system", New Approaches for Security, Privacy and Trust in Complex Environments, IFIP, vol. 232, no. 1, pp. 241-252, 2007.
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments, IFIP
, vol.232
, Issue.1
, pp. 241-252
-
-
Nair, S.1
Dashti, M.2
Crispo, B.3
Tanenbaum, A.4
-
13
-
-
36348954757
-
The ephemerizer: Making data disappear
-
R. Perlman, "The ephemerizer: Making data disappear", Journal of information systems security, vol. 1, no. 1, pp. 21-32, 2005.
-
(2005)
Journal of Information Systems Security
, vol.1
, Issue.1
, pp. 21-32
-
-
Perlman, R.1
-
14
-
-
85180531810
-
Defeating vanish with low-cost sybil attacks against large dhts
-
ISOC
-
S. Wolchok, O. S. Hofmann, N. Heninger, et al., "Defeating vanish with low-cost sybil attacks against large dhts", in Proc. of the 17th Annual Network and Distributed System Security Conference, NDSS'10. ISOC, 2010, pp. 1-15.
-
(2010)
Proc. of the 17th Annual Network and Distributed System Security Conference, NDSS'10
, pp. 1-15
-
-
Wolchok, S.1
Hofmann, O.S.2
Heninger, N.3
-
15
-
-
79952391701
-
Safevanish: An improved data self-destruction for protecting data privacy
-
IEEE
-
L. Zeng, Z. Shi, S. Xu, and D. Feng, "Safevanish: An improved data self-destruction for protecting data privacy", in Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on. IEEE, 2010, pp. 521-528.
-
(2010)
Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference On
, pp. 521-528
-
-
Zeng, L.1
Shi, Z.2
Xu, S.3
Feng, D.4
|