A Survey on Security of Data outsourcing in Cloud
暂无分享,去创建一个
[1] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[2] Sushil Jajodia,et al. A data outsourcing architecture combining cryptography and access control , 2007, CSAW '07.
[3] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[4] Sushil Jajodia,et al. Key management for multi-user encrypted databases , 2005, StorageSS '05.
[5] Sushil Jajodia,et al. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing , 2007, SEC.
[6] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[7] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[8] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.