Encryption-Based Policy Enforcement for Cloud Storage
暂无分享,去创建一个
Sushil Jajodia | Gerardo Pelosi | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti | P. Samarati | S. Vimercati | S. Jajodia | Gerardo Pelosi | S. Paraboschi | S. Foresti
[1] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[2] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[3] Sushil Jajodia,et al. Preserving confidentiality of security policies in data outsourcing , 2008, WPES '08.
[4] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[5] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[6] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[9] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[10] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.