FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
暂无分享,去创建一个
Yu Zhang | Jing Chen | Qing Zhou | Ruiying Du | Yang Xiang | Lan Deng | Yang Xiang | J. Chen | Ruiying Du | Yu Zhang | Qing Zhou | L. Deng
[1] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[2] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Allison Bishop,et al. Revocation Systems with Very Small Private Keys , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[6] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[7] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[8] Matei Ripeanu,et al. Amazon S3 for science grids: a viable solution? , 2008, DADC '08.
[9] R.T.Subhalakshmi,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .
[10] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[11] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[12] Xiao-Feng Wang,et al. Attribute-Based Encryption Schemes: Attribute-Based Encryption Schemes , 2011 .
[13] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[14] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[15] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[16] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[17] Joonsang Baek,et al. New constructions of fuzzy identity-based encryption , 2007, ASIACCS '07.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[20] Michael Scott,et al. On the Efficient Implementation of Pairing-Based Protocols , 2011, IMACC.
[21] Siani Pearson,et al. Privacy, Security and Trust in Cloud Computing , 2013 .
[22] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[23] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[24] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[25] Su Jin,et al. Attribute-Based Encryption Schemes , 2011 .
[26] Chun-I Fan,et al. Arbitrary-State Attribute-Based Encryption with Dynamic Membership , 2014, IEEE Transactions on Computers.
[27] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[28] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[29] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[30] Brent Waters,et al. Attribute-Based Encryption with Fast Decryption , 2013, Public Key Cryptography.
[31] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[32] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[33] M V Patil,et al. HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING , 2006 .