메뉴 건너뛰기




Volumn 4, Issue 2, 2016, Pages 301-315

SafeProtect: Controlled Data Sharing with User-Defined Policies in Cloud-Based Collaborative Environment

Author keywords

Access control; Cloud; Distributed computer networks; monitoring; Policy; Privacy; Security

Indexed keywords

ACCESS CONTROL; CLOUDS; COMPUTER PRIVACY; DATA PRIVACY; MONITORING; PUBLIC POLICY;

EID: 84976521386     PISSN: None     EISSN: 21686750     Source Type: Journal    
DOI: 10.1109/TETC.2015.2502429     Document Type: Article
Times cited : (21)

References (40)
  • 3
    • 84976493222 scopus 로고    scopus 로고
    • Sharing digital data
    • G. Benedis-Grab, "Sharing digital data, " Sci. Children, vol. 48, no. 8, pp. 42-46, 2011.
    • (2011) Sci. Children , vol.48 , Issue.8 , pp. 42-46
    • Benedis-Grab, G.1
  • 4
    • 79952720153 scopus 로고    scopus 로고
    • YouTube: Educational potentials and pitfalls
    • T. Jones and K. Cuthrell, "YouTube: Educational potentials and pitfalls, " Comput. Schools, vol. 28, no. 1, pp. 75-85, 2011.
    • (2011) Comput. Schools , vol.28 , Issue.1 , pp. 75-85
    • Jones, T.1    Cuthrell, K.2
  • 6
    • 77956327013 scopus 로고    scopus 로고
    • Using Google wave and docs for group collaboration
    • D. A. Riley, "Using Google wave and docs for group collaboration, " Library Hi Tech News, vol. 27, nos. 4-5, pp. 12-14, 2010.
    • (2010) Library Hi Tech News , vol.27 , Issue.4-5 , pp. 12-14
    • Riley, D.A.1
  • 7
    • 77953842860 scopus 로고    scopus 로고
    • Sharing medical data for health research: The early personal health record experience
    • E. R. Weitzman, L. Kaci, and K. D. Mandl, "Sharing medical data for health research: The early personal health record experience, " J. Med. Internet Res., vol. 12, no. 2, p. e14, 2010.
    • (2010) J. Med. Internet Res , vol.12 , Issue.2 , pp. 14
    • Weitzman, E.R.1    Kaci, L.2    Mandl, K.D.3
  • 10
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • mNov./Dec
    • H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments, " IEEE Security Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010.
    • (2010) IEEE Security Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 11
    • 77957960367 scopus 로고    scopus 로고
    • Privacy in the clouds
    • A. Cavoukian, "Privacy in the clouds, " Identity Inf. Soc., vol. 1, no. 1, pp. 89-108, 2008.
    • (2008) Identity Inf. Soc , vol.1 , Issue.1 , pp. 89-108
    • Cavoukian, A.1
  • 12
  • 14
    • 84867375385 scopus 로고    scopus 로고
    • BYOD: Security and privacy considerations
    • K. W. Miller, J. Voas, and G. F. Hurlburt, "BYOD: Security and privacy considerations, " IT Prof., vol. 14, no. 5, pp. 53-55, 2012.
    • (2012) IT Prof , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.W.1    Voas, J.2    Hurlburt, G.F.3
  • 15
    • 84857696369 scopus 로고    scopus 로고
    • BYOD: Enabling the chaos
    • G. Thomson, "BYOD: Enabling the chaos, " Netw. Secur., vol. 2012, no. 2, pp. 5-8, 2012. [Online]. Available: http://dx.doi.org/10.1016/S1353-4858(12)70013-2
    • (2012) Netw. Secur , vol.2012 , Issue.2 , pp. 5-8
    • Thomson, G.1
  • 16
    • 79961133783 scopus 로고    scopus 로고
    • Research on privacy-preserving cloud storage framework supporting ciphertext retrieval
    • R. Huang, X. Gui, S. Yu, andW. Zhuang, "Research on privacy-preserving cloud storage framework supporting ciphertext retrieval, " in Proc. Int. Conf. Netw. Comput. Inf. Secur., 2011, pp. 93-97.
    • (2011) Proc. Int. Conf. Netw. Comput. Inf. Secur , pp. 93-97
    • Huang, R.1    Gui, X.2    Yu, S.3    Zhuang, W.4
  • 17
    • 84866350168 scopus 로고    scopus 로고
    • Privacy and security issues in cloud computing
    • D. Bender, "Privacy and security issues in cloud computing, " in Proc. Comput. Internet Lawyer, 2012, pp. 1-15.
    • (2012) Proc. Comput. Internet Lawyer , pp. 1-15
    • Bender, D.1
  • 21
    • 84976492970 scopus 로고    scopus 로고
    • Play station network: Hackers claim to have 2.2m credit cards
    • [Online]. Available accessed Oct 2012
    • A. Charles. (2011). PlayStation network: Hackers claim to have 2.2m credit cards. The Guardian Technology Blog. [Online]. Available: http://www.guardian.co.uk/technology/blog/2011/apr/29/playstation-network-hackers-credit-cards, accessed Oct. 2012.
    • (2011) The Guardian Technology Blog
    • Charles, A.1
  • 22
    • 84976495513 scopus 로고    scopus 로고
    • Feds investigate alleged attacks on Gmail accounts
    • accessed Oct 2012
    • L. Whitney. (2011). Feds investigate alleged attacks on Gmail accounts. CNet News. [Online]. Available: http://news.cnet.com/8301-1009-3-20068229-83/feds-investigate-Alleged-Attacks-on-gmail-Accounts, accessed Oct. 2012.
    • (2011) CNet News
    • Whitney, L.1
  • 23
  • 24
    • 84889958464 scopus 로고    scopus 로고
    • Implementing a portable trusted environment
    • J. Zic and S. Nepal, "Implementing a portable trusted environment, " in Proc. Future Trust Comput. Conf., 2008, pp. 17-29.
    • (2008) Proc. Future Trust Comput. Conf , pp. 17-29
    • Zic, J.1    Nepal, S.2
  • 25
    • 38349053303 scopus 로고    scopus 로고
    • Trust extension device: Providing mobility and portability of trust in cooperative information systems
    • (Lecture Notes in Computer Science), vol. 4803. Berlin, Germany: Springer-Verlag
    • S. Nepal, J. Zic, H. Hwang, and D. Moreland, "Trust extension device: Providing mobility and portability of trust in cooperative information systems, " in On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS (Lecture Notes in Computer Science), vol. 4803. Berlin, Germany: Springer-Verlag, 2007, pp. 253-271
    • (2007) On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS , pp. 253-271
    • Nepal, S.1    Zic, J.2    Hwang, H.3    Moreland, D.4
  • 26
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms, " in Proc. Adv. Cryptol., 1985, pp. 10-18.
    • (1985) Proc. Adv. Cryptol , pp. 10-18
    • El Gamal, T.1
  • 31
  • 33
    • 84897583680 scopus 로고    scopus 로고
    • A platform for secure monitoring and sharing of generic health data in the cloud
    • Jun
    • D. Thilakanathan, S. Chen, S. Nepal, R. A. Calvo, and L. Alem, "A platform for secure monitoring and sharing of generic health data in the cloud, " Future Generat. Comput. Syst., vol. 35, pp. 102-113, Jun. 2014.
    • (2014) Future Generat. Comput. Syst , vol.35 , pp. 102-113
    • Thilakanathan, D.1    Chen, S.2    Nepal, S.3    Calvo, R.A.4    Alem, L.5
  • 38
    • 84919832187 scopus 로고    scopus 로고
    • Secure multiparty data sharing in the cloud using hardware-based TPM devices
    • Jun./Jul
    • D. Thilakanathan, S. Chen, S. Nepal, D. Liu, R. A. Calvo, and J. Zic, "Secure multiparty data sharing in the cloud using hardware-based TPM devices, " in Proc. IEEE 7th CLOUD, Jun./Jul. 2014, pp. 224-231.
    • (2014) Proc IEEE 7th CLOUD , pp. 224-231
    • Thilakanathan, D.1    Chen, S.2    Nepal, S.3    Liu, D.4    Calvo, R.A.5    Zic, J.6
  • 40
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Feb
    • L. Wei, H. Zhu, Z. Cao, W. Jia, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing, " Inf. Sci., vol. 258, pp. 371-386, Feb. 2014.
    • (2014) Inf. Sci , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Jia, W.4    Chen, Y.5    Vasilakos, A.V.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.