-
1
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia A view of cloud computing Commun. ACM 53 2010 50 58
-
(2010)
Commun. ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
ACM
-
S.D.C.D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Over-encryption: management of access control evolution on outsourced data VLDB 2007 ACM 123 134
-
(2007)
VLDB
, pp. 123-134
-
-
Vimercati, S.D.C.D.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
3
-
-
77954464328
-
Cryptographic role-based security mechanisms based on role-key hierarchy
-
ACM
-
Y. Zhu, G.-J. Ahn, H. Hu, and H. Wang Cryptographic role-based security mechanisms based on role-key hierarchy ASIACCS 2010 ACM 314 319
-
(2010)
ASIACCS
, pp. 314-319
-
-
Zhu, Y.1
Ahn, G.-J.2
Hu, H.3
Wang, H.4
-
4
-
-
80053516153
-
Enforcing role-based access control for secure data storage in the cloud
-
L. Zhou, V. Varadharajan, and M. Hitchens Enforcing role-based access control for secure data storage in the cloud Comput. J. 54 2011 1675 1687
-
(2011)
Comput. J.
, vol.54
, pp. 1675-1687
-
-
Zhou, L.1
Varadharajan, V.2
Hitchens, M.3
-
6
-
-
84977755884
-
The ARBAC99 model for administration of roles
-
IEEE Computer Society
-
R.S. Sandhu, and Q. Munawer The ARBAC99 model for administration of roles ACSAC 1999 IEEE Computer Society 229 238
-
(1999)
ACSAC
, pp. 229-238
-
-
Sandhu, R.S.1
Munawer, Q.2
-
7
-
-
0242491000
-
A model for role administration using organization structure
-
S. Oh, and R. Sandhu A model for role administration using organization structure SACMAT 2002 155 162
-
(2002)
SACMAT
, pp. 155-162
-
-
Oh, S.1
Sandhu, R.2
-
8
-
-
33748319570
-
An effective role administration model using organization structure
-
S. Oh, R. Sandhu, and X. Zhang An effective role administration model using organization structure ACM Trans. Inf. Syst. Secur. 9 2006 113 137
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, pp. 113-137
-
-
Oh, S.1
Sandhu, R.2
Zhang, X.3
-
9
-
-
0242625209
-
Administrative scope and role hierarchy operations
-
ACM
-
J. Crampton, and G. Loizou Administrative scope and role hierarchy operations SACMAT 2002 ACM 145 154
-
(2002)
SACMAT
, pp. 145-154
-
-
Crampton, J.1
Loizou, G.2
-
10
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
J. Crampton, and G. Loizou Administrative scope: a foundation for role-based administrative models ACM Trans. Inf. Syst. Secur. 6 2003 201 231
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
13
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Trans. Comput. Syst. 1 1983 239 248
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
15
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati A data outsourcing architecture combining cryptography and access control CSAW 2007 63 69
-
(2007)
CSAW
, pp. 63-69
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
18
-
-
70349557354
-
Hierarchical id-based cryptography
-
Lect. Notes Comput. Sci. Springer
-
C. Gentry, and A. Silverberg Hierarchical id-based cryptography ASIACRYPT Lect. Notes Comput. Sci. vol. 2501 2002 Springer 548 566
-
(2002)
ASIACRYPT
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
19
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Lect. Notes Comput. Sci. Springer
-
D. Boneh, X. Boyen, and E.-J. Goh Hierarchical identity based encryption with constant size ciphertext EUROCRYPT Lect. Notes Comput. Sci. vol. 3494 2005 Springer 440 456
-
(2005)
EUROCRYPT
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
20
-
-
80054995027
-
Provably secure role-based encryption with revocation mechanism
-
Y. Zhu, H. Hu, G.-J. Ahn, H. Wang, and S.-B. Wang Provably secure role-based encryption with revocation mechanism J. Comput. Sci. Technol. 26 2011 697 710
-
(2011)
J. Comput. Sci. Technol.
, vol.26
, pp. 697-710
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Wang, H.4
Wang, S.-B.5
-
22
-
-
33745604534
-
Pairing-friendly elliptic curves of prime order
-
Lect. Notes Comput. Sci. Springer
-
P.S.L.M. Barreto, and M. Naehrig Pairing-friendly elliptic curves of prime order Selected Areas in Cryptography Lect. Notes Comput. Sci. vol. 3897 2005 Springer 319 331
-
(2005)
Selected Areas in Cryptography
, vol.3897
, pp. 319-331
-
-
Barreto, P.S.L.M.1
Naehrig, M.2
-
23
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Lect. Notes Comput. Sci. Springer
-
C. Cocks An identity based encryption scheme based on quadratic residues IMA Int. Conf Lect. Notes Comput. Sci. vol. 2260 2001 Springer 360 363
-
(2001)
IMA Int. Conf
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
24
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing SIAM J. Comput. 32 2003 586 615
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
25
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
Lect. Notes Comput. Sci. Springer
-
D. Boneh, and X. Boyen Efficient selective-id secure identity-based encryption without random oracles EUROCRYPT Lect. Notes Comput. Sci. vol. 3027 2004 Springer 223 238
-
(2004)
EUROCRYPT
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
26
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Lect. Notes Comput. Sci. Springer
-
D. Boneh, and X. Boyen Secure identity based encryption without random oracles CRYPTO Lect. Notes Comput. Sci. vol. 3152 2004 Springer 443 459
-
(2004)
CRYPTO
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
27
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Lect. Notes Comput. Sci. Springer
-
F. Hess Efficient identity based signature schemes based on pairings Selected Areas in Cryptography Lect. Notes Comput. Sci. vol. 2595 2002 Springer 310 324
-
(2002)
Selected Areas in Cryptography
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
28
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Lect. Notes Comput. Sci. Springer
-
J.C. Cha, and J.H. Cheon An identity-based signature from gap Diffie-Hellman groups Public Key Cryptography Lect. Notes Comput. Sci. vol. 2567 2003 Springer 18 30
-
(2003)
Public Key Cryptography
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
29
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Lect. Notes Comput. Sci. Springer
-
P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.-J. Quisquater Efficient and provably-secure identity-based signatures and signcryption from bilinear maps ASIACRYPT Lect. Notes Comput. Sci. vol. 3788 2005 Springer 515 532
-
(2005)
ASIACRYPT
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
30
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Lect. Notes Comput. Sci. Springer
-
R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption EUROCRYPT Lect. Notes Comput. Sci. vol. 3027 2004 Springer 207 222
-
(2004)
EUROCRYPT
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
31
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
-
Lect. Notes Comput. Sci. Springer
-
D. Boneh, and J. Katz Improved efficiency for CCA-secure cryptosystems built using identity-based encryption CT-RSA Lect. Notes Comput. Sci. vol. 3376 2005 Springer 87 103
-
(2005)
CT-RSA
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
|