-
1
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
Jan.
-
C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing, " Comput. Elect. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
-
(2013)
Comput. Elect. Eng.
, vol.39
, Issue.1
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
2
-
-
84904664101
-
Integration of agent-based and cloud computing for the smart objects-oriented IoT
-
Hsinchu, Taiwan, May
-
G. Fortino, A. Guerrieri, W. Russo, and C. Savaglio, "Integration of agent-based and cloud computing for the smart objects-oriented IoT, " in Proc. IEEE Int. Conf. Comput. Supported Cooperat. Work Design, Hsinchu, Taiwan, May 2014, pp. 493-498.
-
(2014)
Proc. IEEE Int. Conf. Comput. Supported Cooperat. Work Design
, pp. 493-498
-
-
Fortino, G.1
Guerrieri, A.2
Russo, W.3
Savaglio, C.4
-
3
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions, " Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Generat. Comput. Syst.
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
4
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Helsinki, Finland
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things, " in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., Helsinki, Finland, 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput.
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
5
-
-
85020469257
-
Security and privacy preservation scheme of face identification and resolution frame-work using fog computing in Internet of Things
-
P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, "Security and privacy preservation scheme of face identification and resolution frame-work using fog computing in Internet of Things, " IEEE Internet Things J. [Online]. Available: https://doi. org/10. 1109/JIOT. 2017. 2659783
-
IEEE Internet Things J.
-
-
Hu, P.1
Ning, H.2
Qiu, T.3
Song, H.4
Wang, Y.5
Yao, X.6
-
6
-
-
84942810277
-
EABDS: Attribute-based secure data sharing with efficient revocation in cloud computing
-
Q. Huang, Z. Ma, Y. Yang, J. Fu, and X. Niu, "EABDS: attribute-based secure data sharing with efficient revocation in cloud computing, " Chin. J. Electron., vol. 24, no. 4, pp. 862-868, 2015.
-
(2015)
Chin. J. Electron.
, vol.24
, Issue.4
, pp. 862-868
-
-
Huang, Q.1
Ma, Z.2
Yang, Y.3
Fu, J.4
Niu, X.5
-
7
-
-
85019142762
-
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
-
May
-
Q. Huang, L. Wang, and Y. Yang, "DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices, " in World Wide Web. May 2017. [Online]. Available: https://doi. org/10. 1007/s11280-017-0462-0
-
(2017)
World Wide Web.
-
-
Huang, Q.1
Wang, L.2
Yang, Y.3
-
8
-
-
84881327557
-
Achieving secure and efficient data collaboration in cloud computing
-
Montreal, QC, Canada, Jun.
-
X. Dong, J. Yu, Y. Luo, Y. Chen, G. Xue, and M. Li, "Achieving secure and efficient data collaboration in cloud computing, " in Proc. IEEE/ACM 21st Int. Symp. Quality Service, Montreal, QC, Canada, Jun. 2013, pp. 195-200.
-
(2013)
Proc. IEEE/ACM 21st Int. Symp. Quality Service
, pp. 195-200
-
-
Dong, X.1
Yu, J.2
Luo, Y.3
Chen, Y.4
Xue, G.5
Li, M.6
-
9
-
-
79956336417
-
Realizing fine-grained and fiexible access control to outsourced data with attribute-based cryptosystems
-
Guangzhou, China
-
F. Zhao, T. Nishide, and K. Sakurai, "Realizing fine-grained and fiexible access control to outsourced data with attribute-based cryptosystems, " in Proc. Inf. Secur. Pract. Exper.-7th Int. Conf., Guangzhou, China, 2011, pp. 83-97.
-
(2011)
Proc. Inf. Secur. Pract. Exper.-7th Int. Conf.
, pp. 83-97
-
-
Zhao, F.1
Nishide, T.2
Sakurai, K.3
-
10
-
-
77954473455
-
Attribute-based signature and its applications
-
Guangzhou, China
-
J. Li, M. H. Au, W. Susilo, D. Xie, and K. Ren, "Attribute-based signature and its applications, " in Proc. 5th Int. Symp. Inf., Comput. Commun. Secur., Guangzhou, China, 2010, pp. 60-69.
-
(2010)
Proc. 5th Int. Symp. Inf., Comput. Commun. Secur.
, pp. 60-69
-
-
Li, J.1
Au, M.H.2
Susilo, W.3
Xie, D.4
Ren, K.5
-
11
-
-
84891761004
-
Decentralized access control with anonymous authentication of data stored in clouds
-
Feb.
-
S. Ruj, M. Stojmenovic, and A. Nayak, "Decentralized access control with anonymous authentication of data stored in clouds, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 384-394, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 384-394
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
12
-
-
84991240131
-
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
-
Jul.
-
Q. Huang, Y. Yang, and M. Shen, "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing, " Future Generat. Comput. Syst., vol. 72, pp. 239-249, Jul. 2017.
-
(2017)
Future Generat. Comput. Syst.
, vol.72
, pp. 239-249
-
-
Huang, Q.1
Yang, Y.2
Shen, M.3
-
13
-
-
85018495637
-
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
-
R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT, " IEEE Access, vol. 5, pp. 3302-3312, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 3302-3312
-
-
Lu, R.1
Heung, K.2
Lashkari, A.H.3
Ghorbani, A.A.4
-
14
-
-
84961877275
-
On security and pri-vacy issues of fog computing supported Internet of Things environment
-
Montreal, QC, Canada, Sep.
-
K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, "On security and pri-vacy issues of fog computing supported Internet of Things environment, " in Proc. Int. Conf. Netw. Future, Montreal, QC, Canada, Sep. 2015, pp. 1-3.
-
(2015)
Proc. Int. Conf. Netw. Future
, pp. 1-3
-
-
Lee, K.1
Kim, D.2
Ha, D.3
Rajput, U.4
Oh, H.5
-
15
-
-
24944554962
-
Fuzzy identity-based encryption
-
Aarhus, Denmark
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption, " in Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn., Aarhus, Denmark, 2005, pp. 457-473.
-
(2005)
Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn.
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
16
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Tallinn, Estonia
-
A. Lewko and B. Waters, "Decentralizing attribute-based encryption, " in Proc. 30th Annu. Int. Conf. Theory Appl. Cryptograph. Techn., Tallinn, Estonia, 2011, pp. 568-588.
-
(2011)
Proc. 30th Annu. Int. Conf. Theory Appl. Cryptograph. Techn.
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
17
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
New York, NY, USA
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACMConf. Comput. Commun. Secur., New York, NY, USA, 2006, pp. 89-98.
-
(2006)
Proc. 13th ACMConf. Comput. Commun. Secur.
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
18
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Berkeley, CA, USA, Mays
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption, " in Proc. IEEE Symp. Secur. Privacy, Berkeley, CA, USA, Mays 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Secur. Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
19
-
-
80053267265
-
Distributed fine-grained access control in wireless sensor networks
-
Anchorage, AK, USA, May
-
S. Ruj, A. Nayak, and I. Stojmenovic, "Distributed fine-grained access control in wireless sensor networks, " in Proc. IEEE Int. Parallel Distrib. Process. Symp., Anchorage, AK, USA, May 2011, pp. 352-362.
-
(2011)
Proc. IEEE Int. Parallel Distrib. Process. Symp.
, pp. 352-362
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
20
-
-
79952071204
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
Apr.
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 4, pp. 673-686, Apr. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.4
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
21
-
-
84979966798
-
Secure and efficient data communication protocol for wireless body area networks
-
Apr./Jun.
-
C. Hu, H. Li, Y. Huo, T. Xiang, and X. Liao, "Secure and efficient data communication protocol for wireless body area networks, " IEEE Trans. Multi-Scale Comput. Syst., vol. 2, no. 2, pp. 94-107, Apr./Jun. 2016.
-
(2016)
IEEE Trans. Multi-Scale Comput. Syst.
, vol.2
, Issue.2
, pp. 94-107
-
-
Hu, C.1
Li, H.2
Huo, Y.3
Xiang, T.4
Liao, X.5
-
22
-
-
85011878988
-
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
-
Jan.
-
Y. Jiang, W. Susilo, Y. Mu, and F. Guo, "Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing, " Future Generat. Comput. Syst., Jan. 2017. [Online]. Available: https://doi. org/10. 1016/j. future. 2017. 01. 026
-
(2017)
Future Generat. Comput. Syst.
-
-
Jiang, Y.1
Susilo, W.2
Mu, Y.3
Guo, F.4
-
23
-
-
85032613000
-
Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revoca-tion
-
Oct.
-
L.-Y. Yeh, P.-Y. Chiang, Y.-L. Tsai, and J.-L. Huang, "Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revoca-tion, " IEEE Trans. Cloud Comput., Oct. 2015. [Online]. Available: https://doi. org/10. 1109/TCC. 2015. 2485199
-
(2015)
IEEE Trans. Cloud Comput.
-
-
Yeh, L.-Y.1
Chiang, P.-Y.2
Tsai, Y.-L.3
Huang, J.-L.4
-
24
-
-
84962022357
-
New Publicly veri-able databases with efficient updates
-
Sep.
-
X. Chen, J. Li, X. Huang, J. Ma, and W. Lou, "New Publicly veri-able databases with efficient updates, " IEEE Trans. Depend. Sec. Comput., vol. 12, no. 5, pp. 546-556, Sep. 2015.
-
(2015)
IEEE Trans. Depend. Sec. Comput.
, vol.12
, Issue.5
, pp. 546-556
-
-
Chen, X.1
Li, J.2
Huang, X.3
Ma, J.4
Lou, W.5
-
25
-
-
84906242615
-
New algorithms for secure outsourcing of modular exponentiations
-
Sep.
-
X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2386-2396, Sep. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.9
, pp. 2386-2396
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
26
-
-
84958540552
-
Online/offiine attribute-based encryp-tion
-
Argentina
-
S. Hohenberger and B. Waters, "Online/offiine attribute-based encryp-tion, " in Proc. 17th Int. Conf. Pract. Theory Public-Key Cryptogr., Buenos Aires, Argentina, 2014, pp. 293-310.
-
(2014)
Proc. 17th Int. Conf. Pract. Theory Public-Key Cryptogr., Buenos Aires
, pp. 293-310
-
-
Hohenberger, S.1
Waters, B.2
-
27
-
-
84991826598
-
Lightweight attribute-based encryption for the Internet of Things
-
Waikoloa, HI, USA, Aug.
-
N. Oualha and K. T. Nguyen, "Lightweight attribute-based encryption for the Internet of Things, " in Proc. 25th Int. Conf. Comput. Commun. Netw., Waikoloa, HI, USA, Aug. 2016, pp. 1-6.
-
(2016)
Proc. 25th Int. Conf. Comput. Commun. Netw.
, pp. 1-6
-
-
Oualha, N.1
Nguyen, K.T.2
-
28
-
-
84954243971
-
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks
-
Feb.
-
A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, "Healing on the cloud: Secure cloud architecture for medical wireless sensor networks, " Future Generat. Comput. Syst., vol. 55, pp. 266-277, Feb. 2016.
-
(2016)
Future Generat. Comput. Syst.
, vol.55
, pp. 266-277
-
-
Lounis, A.1
Hadjidj, A.2
Bouabdallah, A.3
Challal, Y.4
-
29
-
-
85029576091
-
CCA-secure ABE with outsourced decryption for fog computing
-
Nov.
-
C. Zuo, J. Shao, G. Wei, M. Xie, and M. Ji, "CCA-secure ABE with outsourced decryption for fog computing, " Future Generat. Comput. Syst., Nov. 2016. [Online]. Available: https://doi. org/10. 1016/j. future. 2016. 10. 028
-
(2016)
Future Generat. Comput. Syst.
-
-
Zuo, C.1
Shao, J.2
Wei, G.3
Xie, M.4
Ji, M.5
-
30
-
-
85010635879
-
Lightweight distributed secure data management system for health Internet of Things
-
Nov.
-
Y. Yang, X. Zheng, and C. Tang, "Lightweight distributed secure data management system for health Internet of Things, " J. Netw. Comput. Appl., vol. 89, pp. 26-37, Nov. 2016. [Online]. Available: https://doi. org/10. 1016/j. jnca. 2016. 11. 017
-
(2016)
J. Netw. Comput. Appl.
, vol.89
, pp. 26-37
-
-
Yang, Y.1
Zheng, X.2
Tang, C.3
-
31
-
-
85007524464
-
A multi-cloud based privacy-preserving data publishing scheme for the Internet of Things
-
Los Angeles, CA, USA
-
L. Yang, A. Humayed, and F. Li, "A multi-cloud based privacy-preserving data publishing scheme for the Internet of Things, " in Proc. 32nd Annu. Comput. Secur. Appl. Conf., Los Angeles, CA, USA, 2016, pp. 30-39.
-
(2016)
Proc. 32nd Annu. Comput. Secur. Appl. Conf.
, pp. 30-39
-
-
Yang, L.1
Humayed, A.2
Li, F.3
-
32
-
-
85009274837
-
An efficient access control scheme with outsourcing capability and attribute update for fog computing
-
Dec.
-
P. Zhang, Z. Chen, J. K. Liu, K. Liang, and H. Liu, "An efficient access control scheme with outsourcing capability and attribute update for fog computing, " Future Generat. Comput. Syst., Dec. 2016. [Online]. Avail-able: https://doi. org/10. 1016/j. future. 2016. 12. 015
-
(2016)
Future Generat. Comput. Syst.
-
-
Zhang, P.1
Chen, Z.2
Liu, J.K.3
Liang, K.4
Liu, H.5
-
33
-
-
79951783454
-
Attribute-based signa-tures
-
San Francisco, CA, USA
-
H. K. Maji, M. Prabhakaran, and M. Rosulek, "Attribute-based signa-tures, " in Proc. 11th Cryptographers' Track at RSA Conf., Topics Cryptol., San Francisco, CA, USA, 2011, pp. 376-392.
-
(2011)
Proc. 11th Cryptographers' Track at RSA Conf., Topics Cryptol.
, pp. 376-392
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
34
-
-
84892977444
-
EPASS: An expressive attribute-based signature scheme with privacy and an unforgeability guar-antee for the Internet of Things
-
Apr.
-
J. Su, D. Cao, B. Zhao, X. Wang, and I. You, "ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guar-antee for the Internet of Things, " Future Generat. Comput. Syst., vol. 33, no. 2, pp. 11-18, Apr. 2014.
-
(2014)
Future Generat. Comput. Syst.
, vol.33
, Issue.2
, pp. 11-18
-
-
Su, J.1
Cao, D.2
Zhao, B.3
Wang, X.4
You, I.5
-
35
-
-
84910617916
-
Secure outsourced attribute-based signatures
-
Dec.
-
X. Chen, J. Li, X. Huang, J. Li, Y. Xiang, and D. S. Wong, "Secure outsourced attribute-based signatures, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 12, pp. 3285-3294, Dec. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.12
, pp. 3285-3294
-
-
Chen, X.1
Li, J.2
Huang, X.3
Li, J.4
Xiang, Y.5
Wong, D.S.6
-
36
-
-
84927125637
-
On the classification of cyberphysical smart objects in the Internet of Things
-
Berlin, Germany
-
G. Fortino, A. Rovella, W. Russo, and C. Savaglio, "On the classification of cyberphysical smart objects in the Internet of Things, " in Proc. Int. Workshop Netw. Cooperating Objects Smart Cities, Berlin, Germany, 2014, pp. 3-9.
-
(2014)
Proc. Int. Workshop Netw. Cooperating Objects Smart Cities
, pp. 3-9
-
-
Fortino, G.1
Rovella, A.2
Russo, W.3
Savaglio, C.4
|