-
1
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
ACM
-
Benaloh, J., Chase, M., Horvitz, E., Lauter, K.: Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the first ACM Cloud Computing Security Workshop (CCSW’09), pp. 103–114. ACM (2009)
-
(2009)
Proceedings of the First ACM Cloud Computing Security Workshop (CCSW’09)
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P’07), pp. 321–334. IEEE Computer Society (2007)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P’07)
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
33244469997
-
Key management for multi-user encrypted databases
-
ACM
-
Damiani, E., di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Key management for multi-user encrypted databases. In: Proceedings of the 2005 ACM Workshop On Storage Security and Survivability (StorageSS’05), pp. 74–83. ACM (2005)
-
(2005)
Proceedings of the 2005 ACM Workshop on Storage Security and Survivability (StorageSS’05)
, pp. 74-83
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
79959265831
-
Shared and searchable encrypted data for untrusted servers
-
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19(3), 367–397 (2011)
-
(2011)
J. Comput. Secur.
, vol.19
, Issue.3
, pp. 367-397
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
7
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
The Internet Society
-
Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: Proceedings of the Network and Distributed System Security Symposium (NDSS’03). The Internet Society (2003)
-
(2003)
Proceedings of the Network and Distributed System Security Symposium (NDSS’03
-
-
Goh, E.J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
8
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Springer
-
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP’08), pp. 579–591. Springer (2008)
-
(2008)
Proceedings of the 35Th International Colloquium on Automata, Languages and Programming (ICALP’08)
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
9
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS’06), pp. 89–98. ACM (2006)
-
(2006)
Proceedings of the 13Th ACM Conference on Computer and Communications Security (CCS’06)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
11
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
12
-
-
79956030125
-
Easier: Encryption-based access control in social networks with efficient revocation
-
ACM
-
Jahid, S., Mittal, P., Borisov, N.: Easier: encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11), pp. 411–415. ACM (2011)
-
(2011)
Proceedings of the 6Th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11)
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
13
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST’03). USENIX (2003)
-
(2003)
Proceedings of the 2Nd USENIX Conference on File and Storage Technologies (FAST’03). USENIX
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
14
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Springer
-
Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology—EUROCRYPT’10, pp. 62–91. Springer (2010)
-
(2010)
Proceedings of the 29Th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology—EUROCRYPT’10
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
16
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with accountability
-
ACM
-
Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11), pp. 386–390. ACM (2011)
-
(2011)
Proceedings of the 6Th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11)
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.M.4
Wong, D.S.5
Xie, D.6
-
17
-
-
84870706931
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. (2012)
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
18
-
-
77950867637
-
Secure threshold multi authority attribute based encryption without a central authority
-
Lin, H., Cao, Z., Liang, X., Shao, J.: Secure threshold multi authority attribute based encryption without a central authority. Inf. Sci. 180(13), 2618–2632 (2010)
-
(2010)
Inf. Sci.
, vol.180
, Issue.13
, pp. 2618-2632
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
19
-
-
67049156803
-
Distributed attribute-based encryption
-
Springer
-
Müller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute-based encryption. In: Proceedings of the 11th International Conference on Information Security and Cryptology, pp. 20–36. Springer (2008)
-
(2008)
Proceedings of the 11Th International Conference on Information Security and Cryptology
, pp. 20-36
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
21
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
ACM
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), pp. 195–203. ACM (2007)
-
(2007)
Proceedings of the 14Th ACM Conference on Computer and Communications Security (CCS’07)
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
22
-
-
84856190480
-
DACC: Distributed access control in clouds
-
IEEE
-
Ruj, S., Nayak, A., Stojmenovic, I.: DACC: Distributed access control in clouds. In: Proceeding of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’11), pp. 91–98. IEEE (2011)
-
(2011)
Proceeding of the 10Th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’11)
, pp. 91-98
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
24
-
-
74049154660
-
Secure and efficient access to outsourced data
-
ACM
-
Wang, W., Li, Z., Owens, R., Bhargava, B.K.: Secure and efficient access to outsourced data. In: Proceedings of the first ACM Cloud Computing Security Workshop (CCSW’09), pp. 55–66. ACM (2009)
-
(2009)
Proceedings of the First ACM Cloud Computing Security Workshop (CCSW’09)
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.K.4
-
26
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
ACM
-
Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS’10), pp. 261–270. ACM (2010)
-
(2010)
Proceedings of the 5Th ACM Symposium on Information, Computer and Communications Security (ASIACCS’10)
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|