메뉴 건너뛰기




Volumn 1, Issue 2, 2013, Pages 172-186

Hybrid Attribute-and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

Author keywords

cryptography; Distributed computing; mobile computing; scalability; security

Indexed keywords

CRYPTOGRAPHY; MOBILE CLOUD COMPUTING; MOBILE COMPUTING; MOBILE DEVICES; SCALABILITY;

EID: 84969915329     PISSN: None     EISSN: 21687161     Source Type: Journal    
DOI: 10.1109/TCC.2013.11     Document Type: Article
Times cited : (112)

References (23)
  • 2
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Jan.
    • R.L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 26, no. 1, pp. 96-99, Jan. 1983.
    • (1983) Comm ACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • July
    • J. Hur and D.K. Noh, "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
    • (2011) IEEE Trans. Parallel and Distributed Systems , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Noh, D.K.2
  • 10
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb.
    • G. Ateniese, K. Fu, M. Green, S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," ACM Trans. Information and System Security, vol. 9, pp. 1-30, Feb. 2006.
    • (2006) ACM Trans. Information and System Security , vol.9 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 16
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, W. Lou, "Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, pp. 534-542, 2010.
    • (2010) Proc IEEE INFOCOM '10 , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 18
    • 84883076035 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multi-authority cloud storage systems
    • K. Yang, X. Jia, K. Ren, B. Zhang, "DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems," Proc. IEEE INFOCOM, pp. 2895-2903, 2013.
    • (2013) Proc IEEE INFOCOM , pp. 2895-2903
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4
  • 23
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu, J. Wu, "Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services," Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10), pp. 735-737, 2010.
    • (2010) Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10) , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.