-
1
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow et al., "Controlling data in the cloud: Outsourcing computation without outsourcing control, " in Proc. ACM Workshop Cloud Comput. Security, 2009, pp. 85-90.
-
(2009)
Proc. ACM Workshop Cloud Comput. Security
, pp. 85-90
-
-
Chow, R.1
-
3
-
-
84861623252
-
Efficient information retrieval for ranked queries in cost-effective cloud environments
-
Q. Liu, C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments, " in Proc. IEEE INFOCOM, 2012, pp. 2581-2585.
-
(2012)
Proc. IEEE INFOCOM
, pp. 2581-2585
-
-
Liu, Q.1
Tan, C.2
Wu, J.3
Wang, G.4
-
4
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla et al., "Plutus: Scalable secure file sharing on untrusted storage, " in Proc. USENIX Conf. File Storage Technol, 2003, pp. 29-42.
-
(2003)
Proc. USENIX Conf. File Storage Technol
, pp. 29-42
-
-
Kallahalla, M.1
-
5
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing remote untrusted storage, " in Proc. Netw. Distrib. Syst. Security Symp., 2003, pp. 131-145.
-
(2003)
Proc. Netw. Distrib. Syst. Security Symp.
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
6
-
-
34548731375
-
Ciphertext-policy attribute based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute based encryption, " in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
7
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
67049156803
-
Distributed attributebased encryption
-
S. Muller, S. Katzenbeisser, and C. Eckert, "Distributed attributebased encryption, " in Proc. 11th Annu. Int. Conf. Inf. Security Cryptol., 2008, pp. 20-36.
-
(2008)
Proc. 11th Annu. Int. Conf. Inf. Security Cryptol.
, pp. 20-36
-
-
Muller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
10
-
-
77957150308
-
Secure attribute based systems
-
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute based systems, " J. Comput. Security, vol. 18, no. 5, pp. 799-837, 2010.
-
(2010)
J. Comput. Security
, vol.18
, Issue.5
, pp. 799-837
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
11
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1998, pp. 127-144.
-
(1998)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
13
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing, " in Proc. IEEE INFOCOM, 2010, pp. 534-542.
-
(2010)
Proc. IEEE INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
14
-
-
79960839401
-
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
-
G. Wang, Q. Liu, J. Wu, and M. Guo, "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers, " Computers Security, vol. 30, no. 5, pp. 320-331, 2011.
-
(2011)
Computers Security
, vol.30
, Issue.5
, pp. 320-331
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
15
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation, " in Proc. 5th ACM Symp. Inform., Comput. Commun. Security, 2010, pp. 261-270.
-
(2010)
Proc. 5th ACM Symp. Inform., Comput. Commun. Security
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
18
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, " in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 735-737.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Security
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
19
-
-
84856182942
-
Piracy-preserved access control for cloud computing
-
M. Zhou, Y. Mu, W. Susilo, and J. Yan, "Piracy-preserved access control for cloud computing, " in Proc. IEEE TrustCom11, 2011, pp. 83-90.
-
(2011)
Proc. IEEE TrustCom11
, pp. 83-90
-
-
Zhou, M.1
Mu, Y.2
Susilo, W.3
Yan, J.4
-
20
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " in Proc. 12th Annu. Netw. Distrib. Syst. Security Symp., 2005, pp. 29-43.
-
(2005)
Proc. 12th Annu. Netw. Distrib. Syst. Security Symp.
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
21
-
-
84893539927
-
Secure pervasive social networking based on multi-dimensional trust levels
-
Z. Yan, M. Wang, V. Niemi, and R. Kantola, "Secure pervasive social networking based on multi-dimensional trust levels, " in Proc. IEEE Conf. Commun. Netw. Security, 2013, pp. 100-108.
-
(2013)
Proc. IEEE Conf. Commun. Netw. Security
, pp. 100-108
-
-
Yan, Z.1
Wang, M.2
Niemi, V.3
Kantola, R.4
-
22
-
-
84863392301
-
HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing
-
Apr.
-
Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
23
-
-
84875211673
-
A practical reputation system for pervasive social chatting
-
Z. Yan, Y. Chen, and Y. Shen, "A practical reputation system for pervasive social chatting, " Comput. Syst. Sciences, vol. 79, no. 5, pp. 556-572, 2013.
-
(2013)
Comput. Syst. Sciences
, vol.79
, Issue.5
, pp. 556-572
-
-
Yan, Z.1
Chen, Y.2
Shen, Y.3
-
25
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " in Proc. 12th Annu. Netw. Distrib. Syst. Security Symp., 2005, pp. 29-43.
-
(2005)
Proc. 12th Annu. Netw. Distrib. Syst. Security Symp.
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
26
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb.
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
27
-
-
85030107050
-
-
Pairing-Based Cryptography (PBC) library
-
Pairing-Based Cryptography (PBC) library [Online]. Available: http://crypto. stanford. edu/pbc/, 2014.
-
(2014)
-
-
-
28
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
Nov. / Dec.
-
Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 6, pp. 903-916, Nov. / Dec. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.C.2
Lui, J.C.S.3
Perlman, R.4
-
29
-
-
84922962740
-
Personal data access based on trust assessment in mobile social networking
-
Z. Yan, X. Li, and R. Kantola, "Personal data access based on trust assessment in mobile social networking, " in Proc. IEEE 13th Int. Conf. Trust, Security Privacy Comput. Commun., 2014, pp. 989-994.
-
(2014)
Proc. IEEE 13th Int. Conf. Trust, Security Privacy Comput. Commun.
, pp. 989-994
-
-
Yan, Z.1
Li, X.2
Kantola, R.3
-
30
-
-
84947486854
-
Controlling cloud data access based on reputation
-
Springer
-
Z. Yan, X. Li, and R. Kantola, "Controlling Cloud Data Access Based on Reputation, " Mobile Netw. Appl., Springer, 2015, Doi: 10. 1007/s11036-015-0591-6.
-
(2015)
Mobile Netw. Appl.
-
-
Yan, Z.1
Li, X.2
Kantola, R.3
-
31
-
-
84888352650
-
Achieving secure role-based access control on encrypted data in cloud storage
-
Dec.
-
L. Zhou, V. Varadharajan, and M. Hitchens, "Achieving secure role-based access control on encrypted data in cloud storage, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947-1960, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1947-1960
-
-
Zhou, L.1
Varadharajan, V.2
Hitchens, M.3
-
32
-
-
84862938478
-
The design of a trust and role based access control model in cloud computing
-
W. Wang, J. Han, M. Song, and X. Wang, "The design of a trust and role based access control model in cloud computing, " in Proc. 6th Int. Conf. Pervasive Comput. Appl., 2011, pp. 300-334.
-
(2011)
Proc. 6th Int. Conf. Pervasive Comput. Appl.
, pp. 300-334
-
-
Wang, W.1
Han, J.2
Song, M.3
Wang, X.4
-
33
-
-
80054993681
-
An efficient role based access control system for cloud computing
-
T. Zhu, W. Liu, and J. Song, "An efficient role based access control system for cloud computing, " in Proc. IEEE 11th Int. Conf. Comput. Inf. Technol., 2011, pp. 97-102.
-
(2011)
Proc. IEEE 11th Int. Conf. Comput. Inf. Technol.
, pp. 97-102
-
-
Zhu, T.1
Liu, W.2
Song, J.3
-
34
-
-
84886084180
-
Design role-based multi-tenancy access control scheme for cloud services
-
S. Yang, P. Lai, and J. Lin, "Design role-based multi-tenancy access control scheme for cloud services, " in Proc. Int. Symp. Biometrics Security Technol., 2013, pp. 273-279.
-
(2013)
Proc. Int. Symp. Biometrics Security Technol.
, pp. 273-279
-
-
Yang, S.1
Lai, P.2
Lin, J.3
-
35
-
-
84887982439
-
Enabling dynamic data and indirect mutual trust for cloud computing storage systems
-
Dec.
-
A. Barsoum and A. Hasan, "Enabling dynamic data and indirect mutual trust for cloud computing storage systems, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 12, pp. 2375-2385, Dec. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.12
, pp. 2375-2385
-
-
Barsoum, A.1
Hasan, A.2
-
36
-
-
84903708116
-
MTBAC: A mutual trust based access control model in cloud computing
-
G. Lin, D. Wang, Y. Bie, and M. Lei, "MTBAC: A mutual trust based access control model in cloud computing, " China Commun., vol. 11, no. 4, pp. 154-162, 2014.
-
(2014)
China Commun.
, vol.11
, Issue.4
, pp. 154-162
-
-
Lin, G.1
Wang, D.2
Bie, Y.3
Lei, M.4
-
37
-
-
84886903289
-
DAC-MACS: Effective data access control for multiauthority cloud storage systems
-
Nov.
-
K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, "DAC-MACS: Effective data access control for multiauthority cloud storage systems, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1790-1801, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1790-1801
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
Xie, R.5
-
38
-
-
84907207994
-
An anonymous end-to-end communication protocol for mobile cloud environments
-
Jul.-Sep.
-
C. Ardagna, M. Conti, M. Leone, and J. Stefa, "An anonymous end-to-end communication protocol for mobile cloud environments, " IEEE Trans. Services Comput., vol. 7, no. 3, pp. 373-386, Jul.-Sep. 2014.
-
(2014)
IEEE Trans. Services Comput.
, vol.7
, Issue.3
, pp. 373-386
-
-
Ardagna, C.1
Conti, M.2
Leone, M.3
Stefa, J.4
-
39
-
-
84944673148
-
On the feasibility of attribute-based encryption on smartphone devices
-
M. Ambrosin, M. Conti, and T. Dargahi, "On the feasibility of attribute-based encryption on smartphone devices, " in Proc. Workshop IoT Challenges Mobile Ind. Syst., 2015, pp. 49-54.
-
(2015)
Proc. Workshop IoT Challenges Mobile Ind. Syst.
, pp. 49-54
-
-
Ambrosin, M.1
Conti, M.2
Dargahi, T.3
|