-
1
-
-
85053113096
-
-
Amazon Elastic Compute Cloud (Amazon EC2) [Online]. Available: http://aws.amazon.com/ec2/, 2006.
-
(2006)
-
-
-
2
-
-
85053127481
-
-
Amazon Web Service (AWS) [Online]. Available: http://s3. amazonaws.com/, 2006.
-
(2006)
-
-
-
3
-
-
85053105131
-
-
Google App Engine (GAE) [Online]. Available: http://code. google.com/appengine/, 2008.
-
(2008)
-
-
-
4
-
-
85053125414
-
-
Microsoft Azure [Online]. Available: http://www.windowsazure. com, 2008.
-
(2008)
-
-
-
5
-
-
0015331056
-
On the implementation of security measures in formation systems
-
Apr.
-
R. W. Conway, W. L. MaxWell, and H. L. Morgan, "On the implementation of security measures in formation systems," Commun. ACM, vol. 15, no. 4, pp. 211-220, Apr. 1972.
-
(1972)
Commun. ACM
, vol.15
, Issue.4
, pp. 211-220
-
-
Conway, R.W.1
MaxWell, W.L.2
Morgan, H.L.3
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning, "A lattice model of secure information flow," Commun. ACM, vol. 19, no. 5, pp. 236-243, May 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
7
-
-
0003400251
-
-
The MITRE Corp., Bedford, MA, USA, Tech. Rep. TR- A885320, Mar.
-
D. E. Bell and L. J. LaPadula, "Secure computer system: Unified exposition and multics interpretation," The MITRE Corp., Bedford, MA, USA, Tech. Rep. TR- A885320, Mar. 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
8
-
-
0003400255
-
-
The MITRE Corp., Bedford, MA, USA, Tech. Rep. TR-A423930, Apr.
-
K. J. Biba, "Integrity considerations for secure computer systems," The MITRE Corp., Bedford, MA, USA, Tech. Rep. TR-A423930, Apr. 1977.
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
9
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. Sandhu, E. J. Coyne, and H. L. Feinstein, "Role-based access control models," IEEE Comput., vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
-
10
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Adv. Cryptol.: Conf., 1984, pp. 47-53.
-
(1984)
Proc. Adv. Cryptol.: Conf.
, pp. 47-53
-
-
Shamir, A.1
-
13
-
-
77958151362
-
Multi-use and unidirectional identity-based proxy re-encryption schemes
-
H. Wang, Z. Cao, and L. Wang, "Multi-use and unidirectional identity-based proxy re-encryption schemes," Inf. Sci., vol. 180, no. 20, pp. 4042-4059, 2010.
-
(2010)
Inf. Sci.
, vol.180
, Issue.20
, pp. 4042-4059
-
-
Wang, H.1
Cao, Z.2
Wang, L.3
-
14
-
-
84861582429
-
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
-
J. Shao and Z. Cao, "Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption," Inf. Sci., vol. 206, pp. 83-95, 2012.
-
(2012)
Inf. Sci.
, vol.206
, pp. 83-95
-
-
Shao, J.1
Cao, Z.2
-
15
-
-
78449305489
-
Forwardsecure identity-based signature: Security notions and construction
-
J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen, "Forwardsecure identity-based signature: Security notions and construction," Inf. Sci., vol. 181, no. 3, pp. 648-660, 2011.
-
(2011)
Inf. Sci.
, vol.181
, Issue.3
, pp. 648-660
-
-
Yu, J.1
Hao, R.2
Kong, F.3
Cheng, X.4
Fan, J.5
Chen, Y.6
-
16
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
Jul.
-
L. Chen, Z. Cheng, and N. P. Smart, "Identity-based key agreement protocols from pairings," Int. J. Inf. Security, vol. 6, no. 4, pp. 213-241, Jul. 2007.
-
(2007)
Int. J. Inf. Security
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
17
-
-
79960186888
-
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
-
L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer, "Provably secure one-round identity-based authenticated asymmetric group key agreement protocol," Inf. Sci., vol. 181, no. 19, pp. 4318-4329, 2011.
-
(2011)
Inf. Sci.
, vol.181
, Issue.19
, pp. 4318-4329
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
18
-
-
79953290413
-
Key updating technique in identitybased encryption
-
S. Liu, Y. Long, and K. Chen, "Key updating technique in identitybased encryption," Inf. Sci., vol. 181, no. 11, pp. 2436-2440, 2011.
-
(2011)
Inf. Sci.
, vol.181
, Issue.11
, pp. 2436-2440
-
-
Liu, S.1
Long, Y.2
Chen, K.3
-
20
-
-
24944554962
-
Fuzzy identity-based encryption
-
May
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. Adv. Cryptol., May 2005, pp. 457-473.
-
(2005)
Proc. Adv. Cryptol.
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
21
-
-
34547273527
-
Attributebasedencryption for fine-grained access control of encrypted data
-
Oct./Nov.
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attributebasedencryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Security, Oct./Nov. 2006, pp. 89-98.
-
(2006)
Proc. ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
22
-
-
34548731375
-
Ciphertext-policy attribute- based encryption
-
May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute- based encryption," in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proc. 5th Int. Conf. Inf. Inf. Security Practice Experience, 2009, pp. 13-23.
-
(2009)
Proc. 5th Int. Conf. Inf. Inf. Security Practice Experience
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
24
-
-
49049111604
-
Bounded ciphertext policy attribute-based encryption
-
V. Goyal, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute-based encryption," in Proc. 35th Int. Colloquium Automata, Languages Programm., 2008, pp. 579-591.
-
(2008)
Proc. 35th Int. Colloquium Automata, Languages Programm.
, pp. 579-591
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
-
25
-
-
70350630621
-
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
-
L. Ibraimi, Q. Tang, P. Hartel, and Q. Jonker, "Efficient and provable secure ciphertext-policy attribute-based encryption schemes," in Proc. 5th Int. Conf. Inf. Secur. Practice Experience, 2009, pp. 1-12.
-
(2009)
Proc. 5th Int. Conf. Inf. Secur. Practice Experience
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.3
Jonker, Q.4
-
26
-
-
38049078557
-
Multi-authority attribute based encryption
-
M. Chase, "Multi-authority attribute based encryption," in Proc. 4th Conf. Theory Cryptography, 2007, pp. 515-534.
-
(2007)
Proc. 4th Conf. Theory Cryptography
, pp. 515-534
-
-
Chase, M.1
-
27
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
28
-
-
84856190480
-
DACC: Distributed access control in clouds
-
Nov.
-
S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed access control in clouds," in Proc. 10th Int. Conf. Trust, Security Privacy Comput. Commun., Nov. 2011, pp. 91-98.
-
(2011)
Proc. 10th Int. Conf. Trust, Security Privacy Comput. Commun.
, pp. 91-98
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
29
-
-
79960839401
-
Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers
-
G. Wanga, Q. Liu, J. Wu, and M. Guo, "Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers," Comput. Security, vol. 30, pp. 320-331, 2011.
-
(2011)
Comput. Security
, vol.30
, pp. 320-331
-
-
Wanga, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
30
-
-
84863392301
-
HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing
-
Apr.
-
Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
31
-
-
70350357342
-
Attribute-sets: A practically motivated enhancement to attribute-based encryption
-
R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute-sets: A practically motivated enhancement to attribute-based encryption," in Proc. 14th Eur. Symp. Res. Comput. Security Comput. Security, 2009, pp. 587-604.
-
(2009)
Proc. 14th Eur. Symp. Res. Comput. Security Comput. Security
, pp. 587-604
-
-
Bobba, R.1
Khurana, H.2
Prabhakaran, M.3
-
32
-
-
84900818518
-
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
-
H. Deng, Q. Wu, B. Qin, J. Domingo-Ferrer d, and L. Zhang, "Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts," Inf. Sci., vol. 275, pp. 370-384, 2014.
-
(2014)
Inf. Sci.
, vol.275
, pp. 370-384
-
-
Deng, H.1
Wu, Q.2
Qin, B.3
Domingo-Ferrerd, J.4
Zhang, L.5
-
33
-
-
79952523217
-
Constant size ciphertexts in threshold attribute-based encryption
-
J. Herranz, F. Laguillaumie, and C. R'afols, "Constant size ciphertexts in threshold attribute-based encryption," in Proc. 13th Int. Conf. Practice Theory Public Key Cryptography, 2010, pp. 19-34.
-
(2010)
Proc. 13th Int. Conf. Practice Theory Public Key Cryptography
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
R'Afols, C.3
-
34
-
-
84864803494
-
Threshold ciphertext policy attribute- based encryption with constant size ciphertexts
-
A. Ge, R. Zhang, and C. Chen, "Threshold ciphertext policy attribute- based encryption with constant size ciphertexts," in Proc. 13th Int. Conf. Practice Theory Public Key Cryptography, 2012, pp. 336-349.
-
(2012)
Proc. 13th Int. Conf. Practice Theory Public Key Cryptography
, pp. 336-349
-
-
Ge, A.1
Zhang, R.2
Chen, C.3
-
35
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
D. Boneh, X. Boyen, and E.-J. Goh, "Hierarchical identity based encryption with constant size ciphertext," in Proc. Adv. Cryptol., 2005, pp. 440-456.
-
(2005)
Proc. Adv. Cryptol.
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
36
-
-
85053143192
-
-
The Pairing-Based Cryptography Library [Online]. Available: http://crypto.stanford.edu/pbc/, 2006.
-
(2006)
-
-
-
37
-
-
85053167955
-
-
The GNU Multiple Precision Arithmetic Library [Online]. Available: http://gmplib.org/, 2002.
-
(2002)
-
-
|