Garbled role-based access control in the cloud
暂无分享,去创建一个
Yang Xiang | Masoom Alam | Houcine Hassan | Tanveer Khan | Naina Emmanuel | Yang Xiang | H. Hassan | Masoom Alam | Naina Emmanuel | Tanveer Khan
[1] Luca Viganò,et al. Security Constraints in Temporal Role-Based Access-Controlled Workflows , 2015, CODASPY.
[2] Jorge Lobo,et al. Privacy-aware role-based access control , 2010 .
[3] Weiran Liu,et al. Anonymous Role-Based Access Control on E-Health Records , 2016, IACR Cryptol. ePrint Arch..
[4] Ling Liu,et al. Role-based and time-bound access and management of EHR data , 2014, Secur. Commun. Networks.
[5] Ali Miri,et al. Using Mediated Identity-Based Cryptography to Support Role-Based Access Control , 2004, ISC.
[6] Lionel C. Briand,et al. A Model-driven Approach to Representing and Checking RBAC Contextual Policies , 2016, CODASPY.
[7] Hiroyuki Sato,et al. An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[8] Xiaohui Liang,et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[9] Yongge Wang,et al. Garbled computation in cloud , 2016, Future Gener. Comput. Syst..
[10] Vijay Varadharajan,et al. Secure administration of cryptographic role-based access control for large-scale cloud storage systems , 2014, J. Comput. Syst. Sci..
[11] Yongge Wang,et al. Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes , 2016, ESORICS.
[12] Hiroyuki Sato,et al. Privacy-preserving access control model for big data cloud , 2015, 2015 International Computer Science and Engineering Conference (ICSEC).
[13] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[14] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[15] Hsing-Chung Chen,et al. A trusted user-to-role and role-to-key access control scheme , 2015, Soft Computing.
[16] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[17] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[18] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[19] M Gobi,et al. AN ACCESS CONTROL PROTOCOL FOR CLOUD DATA USING SECURED HYPER ELLIPTIC CURVE CRYPTOGRAPHY. , 2016 .
[20] Georg Fuchsbauer,et al. Policy Privacy in Cryptographic Access Control , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[21] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[22] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[23] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[24] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[25] J. Hsu,et al. Context-aware Access Control in Pervasive Healthcare , 2005 .
[26] Vijay Varadharajan,et al. Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage , 2015, IEEE Transactions on Information Forensics and Security.
[27] Fatima Amounas,et al. ECC Encryption and Decryption with a Data Sequence , 2012 .
[28] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[29] Xin Zhou,et al. Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.