메뉴 건너뛰기




Volumn 64, Issue 9, 2015, Pages 2595-2608

k-Times Attribute-Based Anonymous Access Control for Cloud Computing

Author keywords

anonymous access; attribute based; cloud computing; k times

Indexed keywords

AUTHENTICATION; CLOUD COMPUTING;

EID: 84939245573     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2014.2366741     Document Type: Article
Times cited : (46)

References (43)
  • 3
    • 84939220113 scopus 로고    scopus 로고
    • Available
    • Google App Engine [Online]. Available http://code.google.com/appengine/, 2014.
    • (2014) Google App Engine [Online]
  • 4
    • 84939226238 scopus 로고    scopus 로고
    • Available
    • Yahoo Pig [Online]. Available http://labs.yahoo.com/project/pig/, 2014.
    • (2014) Yahoo Pig [Online]
  • 5
    • 84939235961 scopus 로고    scopus 로고
    • Available
    • Salesforce.com [Online]. Available http://www.salesforce.com/, 2014.
    • (2014) Salesforce.Com [Online]
  • 6
    • 84871816306 scopus 로고    scopus 로고
    • Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
    • M. H. Au, J. K. Liu, W. Susilo, and T. H. Yuen, "Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction," Theor. Comput. Sci., vol. 469, pp. 1-14, 2013.
    • (2013) Theor. Comput. Sci. , vol.469 , pp. 1-14
    • Au, M.H.1    Liu, J.K.2    Susilo, W.3    Yuen, T.H.4
  • 7
    • 84888085041 scopus 로고    scopus 로고
    • Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE
    • Nov. 6
    • M. H. Au, J. K. Liu, W. Susilo, and J. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1909-1922, Nov. 6, 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1909-1922
    • Au, M.H.1    Liu, J.K.2    Susilo, W.3    Zhou, J.4
  • 9
    • 41149174785 scopus 로고    scopus 로고
    • Like technology from an advanced alien culture: Google apps for education at ASU
    • K. Barlow and J. Lane, "Like technology from an advanced alien culture: Google apps for education at ASU," in Proc. 35th Annu. ACM SIGUCCS Fall Conf., 2007, pp. 8-10.
    • Proc. 35th Annu. ACM SIGUCCS Fall Conf., 2007 , pp. 8-10
    • Barlow, K.1    Lane, J.2
  • 13
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • D. Boneh and X. Boyen, "Efficient selective-ID secure identity-based encryption without random oracles," in Proc. EUROCRYPT, 2004, pp. 223-238.
    • Proc. EUROCRYPT, 2004 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 20
    • 79952523629 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • [Online]. Available
    • A. Lewko and B. Waters. (2010). Decentralizing attribute-based encryption, Cryptology ePrint Archive, Rep. 2010/351 [Online]. Available: http://eprint.iacr.org/
    • (2010) Cryptology ePrint Archive
    • Lewko, A.1    Waters, B.2
  • 23
    • 84890338882 scopus 로고    scopus 로고
    • Linkable ring signature with unconditional anonymity
    • Jan
    • J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, "Linkable ring signature with unconditional anonymity," IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 157-165, Jan. 2014.
    • (2014) IEEE Trans. Knowl. Data Eng. , vol.26 , Issue.1 , pp. 157-165
    • Liu, J.K.1    Au, M.H.2    Susilo, W.3    Zhou, J.4
  • 25
    • 33845535348 scopus 로고    scopus 로고
    • Enhanced security models and a generic construction approach for linkable ring signature
    • J. K. Liu and D. S. Wong, "Enhanced security models and a generic construction approach for linkable ring signature," Int. J. Found. Comput. Sci., vol. 17, no. 6, pp. 1403-1422, 2006.
    • (2006) Int. J. Found. Comput. Sci. , vol.17 , Issue.6 , pp. 1403-1422
    • Liu, J.K.1    Wong, D.S.2
  • 29
    • 84887271407 scopus 로고    scopus 로고
    • Efficient dynamic k-times anonymous authentication
    • L. Nguyen, "Efficient dynamic k-times anonymous authentication," in Proc. VIETCRYPT, 2006, pp. 81-98.
    • Proc. VIETCRYPT, 2006 , pp. 81-98
    • Nguyen, L.1
  • 35
  • 37
    • 78449233611 scopus 로고    scopus 로고
    • A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
    • P. P. Tsang, M. H. Au, J. K. Liu, W. Susilo, and D. S. Wong, "A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity," in Proc. ProvSec, 2010, pp. 166-183.
    • Proc. ProvSec, 2010 , pp. 166-183
    • Tsang, P.P.1    Au, M.H.2    Liu, J.K.3    Susilo, W.4    Wong, D.S.5
  • 40
    • 84863392301 scopus 로고    scopus 로고
    • HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 2, pp. 743-754, 2012.
    • (2012) IEEE Trans. Inf. Forensics Secur. , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 42
    • 84875690586 scopus 로고    scopus 로고
    • Efficient linkable and/or threshold ring signature without random oracles
    • T. H. Yuen, J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, "Efficient linkable and/or threshold ring signature without random oracles," Comput. J., vol. 56, no. 4, pp. 407-421, 2013.
    • (2013) Comput. J. , vol.56 , Issue.4 , pp. 407-421
    • Yuen, T.H.1    Liu, J.K.2    Au, M.H.3    Susilo, W.4    Zhou, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.