Capability-based Cryptographic Data Access Control in Cloud Computing
暂无分享,去创建一个
[1] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[2] Lakshmi Sobhana Kalli,et al. Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .
[3] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[4] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[5] Sushil Jajodia,et al. A data outsourcing architecture combining cryptography and access control , 2007, CSAW '07.
[6] Avishai Wool,et al. Toward securing untrusted storage without public-key operations , 2005, StorageSS '05.
[7] Qin Zhou,et al. A PKI-based mechanism for secure and efficient access to outsourced data , 2010, 2010 International Conference on Networking and Digital Society.
[8] Robert S. Fabry,et al. Capability-based addressing , 1974, CACM.
[9] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[10] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[11] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[13] Mukesh Singhal,et al. Advanced Concepts In Operating Systems , 1994 .
[14] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[15] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.
[16] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[17] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[18] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.