-
1
-
-
77950347409
-
'A view of cloud computing'
-
Armbrust, M., Fox, A., Griffith, R., et al.: 'A view of cloud computing', Commun. ACM, 2010, 53, (4), pp. 50-58
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
-
2
-
-
84957718934
-
'Divertible protocols and atomic proxy cryptography'
-
Nyberg, K., (Ed.) (Springer, Berlin Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: 'Divertible protocols and atomic proxy cryptography', in Nyberg, K., (Ed.): 'Advances in cryptology - EUROCRYPT'98, ser. lecture notes in computer science' (Springer, Berlin Heidelberg, 1998), vol. 1403, pp. 127-144
-
(1998)
'Advances in cryptology - EUROCRYPT'98, ser. lecture notes in computer science'
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
3
-
-
33745218758
-
'Improved proxy re-encryption schemes with applications to secure distributed storage'
-
Ateniese, G., Fu, K., Green, M., et al.: 'Improved proxy re-encryption schemes with applications to secure distributed storage', ACM Trans. Inf. Syst. Secur., 2006, 9, (1), pp. 1-30
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
-
4
-
-
84883057189
-
'Public auditing for shared data with efficient user revocation in the cloud'
-
April 2013
-
Wang, B., Li, B., Li, H.: 'Public auditing for shared data with efficient user revocation in the cloud'. 2013 Proc. of IEEE INFOCOM, April 2013, pp. 2904-2912
-
(2013)
Proc. of IEEE INFOCOM
, pp. 2904-2912
-
-
Wang, B.1
Li, B.2
Li, H.3
-
5
-
-
84860512062
-
'A secure erasure code-based cloud storage system with secure data forwarding'
-
Lin, H.Y., Tzeng, W.G.: 'A secure erasure code-based cloud storage system with secure data forwarding', IEEE Trans. Parallel Distrib. Syst., 2012, 23, (6), pp. 995-1003
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.6
, pp. 995-1003
-
-
Lin, H.Y.1
Tzeng, W.G.2
-
6
-
-
77953310709
-
'Achieving secure, scalable, and fine-grained data access control in cloud computing'
-
March 2010
-
Yu, S.,Wang, C., Ren, K., et al.: 'Achieving secure, scalable, and fine-grained data access control in cloud computing'. 2010 Proc. of IEEE INFOCOM, March 2010, pp. 1-9
-
(2010)
Proc. of IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
-
7
-
-
77954471010
-
Attribute based data sharing with attribute revocation'
-
Fifth ACM Symp. on Information, Computer and Communications Security
-
Yu, S., Wang, C., Ren, K., et al.: 'Attribute based data sharing with attribute revocation'. Proc. Fifth ACM Symp. on Information, Computer and Communications Security, 2010, pp. 261-270
-
(2010)
Proc
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
-
8
-
-
79957599737
-
'Ciphertext policy attribute based encryption with efficient revocation'
-
(University of Waterloo
-
Liang, X., Lu, R., Lin, X., et al.: 'Ciphertext policy attribute based encryption with efficient revocation' (University of Waterloo, 2010)
-
(2010)
-
-
Liang, X.1
Lu, R.2
Lin, X.3
-
9
-
-
84886903289
-
'DAC-MACS: effective data access control for multiauthority cloud storage systems'
-
Yang, K., Jia, X.H., Ren, K., et al.: 'DAC-MACS: effective data access control for multiauthority cloud storage systems', IEEE Trans. Inf. Forensics Secur., 2013, 8, (11), pp. 1790-1801
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.11
, pp. 1790-1801
-
-
Yang, K.1
Jia, X.H.2
Ren, K.3
-
10
-
-
84877786210
-
'Mona: secure multi-owner data sharing for dynamic groups in the cloud'
-
Liu, X., Zhang, Y., Wang, B., et al.: 'Mona: secure multi-owner data sharing for dynamic groups in the cloud', IEEE Trans. Parallel Distrib. Syst., 2013, 24, (6), pp. 1182-1191
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1182-1191
-
-
Liu, X.1
Zhang, Y.2
Wang, B.3
-
11
-
-
84878313623
-
'Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage'
-
Cheng, Y., Wang, Z.Y., Ma, J., et al.: 'Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage', J. Zhejiang Univ. Sci. C, 2013, 14, (2), pp. 85-97
-
(2013)
J. Zhejiang Univ. Sci. C
, vol.14
, Issue.2
, pp. 85-97
-
-
Cheng, Y.1
Wang, Z.Y.2
Ma, J.3
-
12
-
-
84921381171
-
'Identity-based encryption with outsourced revocation in cloud computing'
-
Li, J., Li, J., Chen, X., et al.: 'Identity-based encryption with outsourced revocation in cloud computing', IEEE Trans. Comput., 2015, 64, (2), pp. 425-437
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
-
13
-
-
77954472312
-
Secure provenance: the essential of bread and butter of data forensics in cloud computing'
-
Fifth ACM Symp. on Information, Computer and Communications Security
-
Lu, R., Lin, X., Liang, X., et al.: 'Secure provenance: the essential of bread and butter of data forensics in cloud computing'. Proc. Fifth ACM Symp. on Information, Computer and Communications Security, 2010, pp. 282-292
-
(2010)
Proc
, pp. 282-292
-
-
Lu, R.1
Lin, X.2
Liang, X.3
-
14
-
-
85032883059
-
'A public key cryptosystem and a signature scheme based on discrete logarithms'
-
ElGamal, T.: 'A public key cryptosystem and a signature scheme based on discrete logarithms', Adv. Cryptol., 1985, pp. 10-18
-
(1985)
Adv. Cryptol.
, pp. 10-18
-
-
ElGamal, T.1
-
15
-
-
0024641589
-
'Efficient dispersal of information for security
-
Rabin, M.O.: 'Efficient dispersal of information for security, load balancing, and fault tolerance', J. ACM, 1989, 36, (2), pp. 335-348
-
(1989)
load balancing, and fault tolerance', J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
16
-
-
85077023955
-
AONT-RS: blending security and performance in dispersed storage systems'
-
on File and Storage Technologies
-
Resch, J.K., Plank, J.S.: 'AONT-RS: blending security and performance in dispersed storage systems'. USENIX Conf. on File and Storage Technologies, 2011, pp. 191-202
-
(2011)
USENIX Conf
, pp. 191-202
-
-
Resch, J.K.1
Plank, J.S.2
-
17
-
-
0018545449
-
'How to share a secret'
-
Shamir, A.: 'How to share a secret', Commun. ACM, 1979, 22, (11), pp. 612-613
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
84893791666
-
'A secure and efficient scheme for cloud storage against eavesdropper'
-
Qing, S., Zhou, J., Liu, D., (Eds) (Springer International Publishing
-
Liu, J., Wang, H., Xian, M., et al.: 'A secure and efficient scheme for cloud storage against eavesdropper', in Qing, S., Zhou, J., Liu, D., (Eds): 'Information and communications security, ser. lecture notes in computer science' (Springer International Publishing, 2013), vol. 8233, pp. 75-89
-
(2013)
'Information and communications security, ser. lecture notes in computer science'
, vol.8233
, pp. 75-89
-
-
Liu, J.1
Wang, H.2
Xian, M.3
-
19
-
-
3142523603
-
'The UCON ABC usage control model'
-
Park, J., Sandhu, R.: 'The UCON ABC usage control model', ACM Trans. Inf. Syst. Secur., 2004, 7, (1), pp. 128-174
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
20
-
-
84891802796
-
'Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation'
-
Chen, H., Lee, P.: 'Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation', IEEE Trans. on Parallel Distrib. Syst., 2014, 25, (2), pp. 407-416
-
(2014)
IEEE Trans. on Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 407-416
-
-
Chen, H.1
Lee, P.2
-
21
-
-
84964194513
-
'Why is elgamal key generation so slow?'
-
accessed June
-
'Why is elgamal key generation so slow?'. Available at http://www.cryptopp.com/ fom-serve/cache/71.html, accessed June 2015
-
(2015)
-
-
|