-
1
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84858284080
-
Data storage auditing service in cloud computing: Challenges, methods and opportunities
-
K. Yang and X. Jia, "Data storage auditing service in cloud computing: Challenges, methods and opportunities," World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
-
(2012)
World Wide Web
, vol.15
, Issue.4
, pp. 409-428
-
-
Yang, K.1
Jia, X.2
-
3
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1-11, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
4
-
-
84903121888
-
Expressive, efficient and revocable data access control for multi-authority cloud storage
-
Jul.
-
K. Yang and X. Jia, "Expressive, efficient and revocable data access control for multi-authority cloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.7
, pp. 1735-1744
-
-
Yang, K.1
Jia, X.2
-
6
-
-
84883325513
-
An efficient attribute-based encryption and access control scheme for cloud storage environment
-
J.-Y. Huang, C.-K. Chiang, and I.-E. Liao, "An efficient attribute-based encryption and access control scheme for cloud storage environment," in Proc. 8th Int. Conf. Grid Pervasive Comput., 2013, pp. 453-463.
-
(2013)
Proc. 8th Int. Conf. Grid Pervasive Comput.
, pp. 453-463
-
-
Huang, J.-Y.1
Chiang, C.-K.2
Liao, I.-E.3
-
7
-
-
84863392301
-
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Apr.
-
Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
8
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 735-737.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Security
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
9
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 239-248, 1983.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
10
-
-
39149132135
-
A secure group key management scheme for hierarchical mobile ad hoc networks
-
D. Huang and D. Medhi, "A secure group key management scheme for hierarchical mobile ad hoc networks," Ad Hoc Netw., vol. 6, no. 4, pp. 560-577, 2008.
-
(2008)
Ad Hoc Netw.
, vol.6
, Issue.4
, pp. 560-577
-
-
Huang, D.1
Medhi, D.2
-
11
-
-
84911091131
-
An efficient solution for hierarchical access control problem in cloud environment
-
B.-Z. He, C.-M. Chen, T.-Y. Wu, and H.-M. Sun, "An efficient solution for hierarchical access control problem in cloud environment," Math. Problems Eng., vol. 2014, p. 8, 2014.
-
(2014)
Math. Problems Eng.
, vol.2014
, pp. 8
-
-
He, B.-Z.1
Chen, C.-M.2
Wu, T.-Y.3
Sun, H.-M.4
-
12
-
-
84879364477
-
UCloud: A user-centric key management scheme for cloud data protection
-
Y.-W. Kao, K.-Y. Huang, H.-Z. Gu, and S.-M. Yuan, "uCloud: A user-centric key management scheme for cloud data protection," IET Inf. Security, vol. 7, no. 2, pp. 144-154, 2013.
-
(2013)
IET Inf. Security
, vol.7
, Issue.2
, pp. 144-154
-
-
Kao, Y.-W.1
Huang, K.-Y.2
Gu, H.-Z.3
Yuan, S.-M.4
-
13
-
-
84867371233
-
A secure hierarchical key management scheme in wireless sensor network
-
Y. Zhang, X. Li, J. Liu, J. Yang, and B. Cui, "A secure hierarchical key management scheme in wireless sensor network," Int. J. Distrib. Sensor Netw., vol. 2012, p. 8, 2012.
-
(2012)
Int. J. Distrib. Sensor Netw.
, vol.2012
, pp. 8
-
-
Zhang, Y.1
Li, X.2
Liu, J.3
Yang, J.4
Cui, B.5
-
14
-
-
84859873785
-
An efficient key management scheme for content access control for linear hierarchies
-
H. Ragab Hassen, H. Bettahar, A. Bouadbdallah, and Y. Challal, "An efficient key management scheme for content access control for linear hierarchies," Comput. Netw., vol. 56, no. 8, pp. 2107-2118, 2012.
-
(2012)
Comput. Netw.
, vol.56
, Issue.8
, pp. 2107-2118
-
-
Ragab Hassen, H.1
Bettahar, H.2
Bouadbdallah, A.3
Challal, Y.4
-
15
-
-
80052271043
-
Efficient provably-secure hierarchical key assignment schemes
-
A. D. Santis, A. L. Ferrara, and B. Masucci, "Efficient provably-secure hierarchical key assignment schemes," Theoretical Comput. Sci., vol. 412, no. 41, pp. 5684-5699, 2011.
-
(2011)
Theoretical Comput. Sci.
, vol.412
, Issue.41
, pp. 5684-5699
-
-
Santis, A.D.1
Ferrara, A.L.2
Masucci, B.3
-
16
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, "Dynamic and efficient key management for access hierarchies," ACM Trans. Inf. Syst. Security, vol. 12, no. 3, article 18, pp. 1-43, 2009.
-
(2009)
ACM Trans. Inf. Syst. Security
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
17
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
V. R. Shen and T.-S. Chen, "A novel key management scheme based on discrete logarithms and polynomial interpolations," Comput. Security, vol. 21, no. 2, pp. 164-171, 2002.
-
(2002)
Comput. Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.1
Chen, T.-S.2
-
18
-
-
35948945322
-
A dynamic key management solution to access hierarchy
-
X. Zou, Y. Karandikar, and E. Bertino, "A dynamic key management solution to access hierarchy," Int. J. Netw. Manage., vol. 17, no. 6, pp. 437-450, 2007.
-
(2007)
Int. J. Netw. Manage.
, vol.17
, Issue.6
, pp. 437-450
-
-
Zou, X.1
Karandikar, Y.2
Bertino, E.3
-
19
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
A. D. Santis, A. L. Ferrara, and B. Masucci, "Cryptographic key assignment schemes for any access control policy," Inf. Process. Lett., vol. 92, no. 4, pp. 199-205, 2004.
-
(2004)
Inf. Process. Lett.
, vol.92
, Issue.4
, pp. 199-205
-
-
Santis, A.D.1
Ferrara, A.L.2
Masucci, B.3
-
20
-
-
0344089052
-
A new key assignment scheme for enforcing complicated access control policies in hierarchy
-
I.-C. Lin, M.-S. Hwang, and C.-C. Chang, "A new key assignment scheme for enforcing complicated access control policies in hierarchy," Future Gener. Comput. Syst., vol. 19, no. 4, pp. 457-462, 2003.
-
(2003)
Future Gener. Comput. Syst.
, vol.19
, Issue.4
, pp. 457-462
-
-
Lin, I.-C.1
Hwang, M.-S.2
Chang, C.-C.3
-
21
-
-
43649095362
-
An efficient time-bound hierarchical key management scheme for secure broadcasting
-
Apr.-Jun.
-
E. Bertino, N. Shang, and S. S. Wagstaff, "An efficient time-bound hierarchical key management scheme for secure broadcasting," IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 65-70, Apr.-Jun. 2008.
-
(2008)
IEEE Trans. Dependable Secure Comput.
, vol.5
, Issue.2
, pp. 65-70
-
-
Bertino, E.1
Shang, N.2
Wagstaff, S.S.3
-
22
-
-
34948898634
-
Access control in user hierarchy based on elliptic curve cryptosystem
-
Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen, "Access control in user hierarchy based on elliptic curve cryptosystem," Inf. Sci., vol. 178, no. 1, pp. 230-243, 2008.
-
(2008)
Inf. Sci.
, vol.178
, Issue.1
, pp. 230-243
-
-
Chung, Y.F.1
Lee, H.H.2
Lai, F.3
Chen, T.S.4
-
23
-
-
33745856988
-
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
-
F.-G. Jeng and C.-M. Wang, "An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem," J. Syst. Softw., vol. 79, no. 8, pp. 1161-1167, 2006.
-
(2006)
J. Syst. Softw.
, vol.79
, Issue.8
, pp. 1161-1167
-
-
Jeng, F.-G.1
Wang, C.-M.2
-
24
-
-
79751531498
-
Secure key management scheme for dynamic hierarchical access control based on ECC
-
Y.-L. Lin and C.-L. Hsu, "Secure key management scheme for dynamic hierarchical access control based on ECC," J. Syst. Softw., vol. 84, no. 4, pp. 679-685, 2011.
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.4
, pp. 679-685
-
-
Lin, Y.-L.1
Hsu, C.-L.2
-
25
-
-
84862699099
-
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
-
A. K. Das, N. R. Paul, and L. Tripathy, "Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem," Inf. Sci., vol. 209, pp. 80-92, 2012.
-
(2012)
Inf. Sci.
, vol.209
, pp. 80-92
-
-
Das, A.K.1
Paul, N.R.2
Tripathy, L.3
-
26
-
-
10444280844
-
A novel key management scheme for dynamic access control in a user hierarchy
-
T.-S. Chen and J.-Y. Huang, "A novel key management scheme for dynamic access control in a user hierarchy," Appl. Math. Comput., vol. 162, no. 1, pp. 339-351, 2005.
-
(2005)
Appl. Math. Comput.
, vol.162
, Issue.1
, pp. 339-351
-
-
Chen, T.-S.1
Huang, J.-Y.2
-
27
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Jan.
-
W.-G. Tzeng, "A time-bound cryptographic key assignment scheme for access control in a hierarchy," IEEE Trans. Knowl. Data Eng., vol. 14, no. 1, pp. 182-188, Jan. 2002.
-
(2002)
IEEE Trans. Knowl. Data Eng.
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
28
-
-
0041347682
-
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
-
Jul./Aug.
-
X. Yi and Y. Ye, "Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy," IEEE Trans. Knowl. Data Eng., vol. 15, no. 4, pp. 1054-1055, Jul./Aug. 2003.
-
(2003)
IEEE Trans. Knowl. Data Eng.
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
29
-
-
84862218233
-
Provably-secure time-bound hierarchical key assignment schemes
-
G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, "Provably-secure time-bound hierarchical key assignment schemes," J. Cryptol., vol. 25, no. 2, pp. 243-270, 2012.
-
(2012)
J. Cryptol.
, vol.25
, Issue.2
, pp. 243-270
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
30
-
-
84879857216
-
CloudHKA: A cryptographic approach for hierarchical access control in cloud computing
-
Y.-R. Chen, C.-K. Chu, W.-G. Tzeng, and J. Zhou, "CloudHKA: A cryptographic approach for hierarchical access control in cloud computing," in Proc. 11th Int. Conf. Appl. Cryptography Netw. Security, 2013, pp. 37-52.
-
(2013)
Proc. 11th Int. Conf. Appl. Cryptography Netw. Security
, pp. 37-52
-
-
Chen, Y.-R.1
Chu, C.-K.2
Tzeng, W.-G.3
Zhou, J.4
-
31
-
-
84874338954
-
Simple, efficient and strongly KIsecure hierarchical key assignment schemes
-
E. Freire, K. Paterson, and B. Poettering, "Simple, efficient and strongly KIsecure hierarchical key assignment schemes," in Proc. Cryptographers' Track RSA Conf., 2013, pp. 101-114.
-
(2013)
Proc. Cryptographers' Track RSA Conf.
, pp. 101-114
-
-
Freire, E.1
Paterson, K.2
Poettering, B.3
-
32
-
-
0036396975
-
Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
-
T.-S. Chen and Y.-F. Chung, "Hierarchical access control based on Chinese remainder theorem and symmetric algorithm," Comput. Security, vol. 21, no. 6, pp. 565-570, 2002.
-
(2002)
Comput. Security
, vol.21
, Issue.6
, pp. 565-570
-
-
Chen, T.-S.1
Chung, Y.-F.2
-
33
-
-
0038103896
-
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
-
C.-L. Hsu and T.-S. Wu, "Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy," Comput. Security, vol. 22, no. 5, pp. 453-456, 2003.
-
(2003)
Comput. Security
, vol.22
, Issue.5
, pp. 453-456
-
-
Hsu, C.-L.1
Wu, T.-S.2
-
34
-
-
0038780901
-
A comment on the Chen-Chung scheme for hierarchical access control
-
S. Zhong and T. Lin, "A comment on the Chen-Chung scheme for hierarchical access control," Comput. Security, vol. 22, no. 5, pp. 450-452, 2003.
-
(2003)
Comput. Security
, vol.22
, Issue.5
, pp. 450-452
-
-
Zhong, S.1
Lin, T.2
-
35
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proc. 7th ACM Conf. Comput. Commun. Security, 2000, pp. 235-244.
-
(2000)
Proc. 7th ACM Conf. Comput. Commun. Security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
36
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security
-
M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," in Proc. 37th Annu. Symp. Found. Comput. Sci., 1996, pp. 514-523.
-
(1996)
Proc. 37th Annu. Symp. Found. Comput. Sci.
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
|