Security from the transparent computing aspect
暂无分享,去创建一个
Jianer Chen | Qin Liu | Guojun Wang | Yang Xiang | Jianer Chen | Guojun Wang | Qin Liu | Yang Xiang
[1] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[2] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[3] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[4] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[6] Laurence T. Yang,et al. Information security underlying transparent computing: Impacts, visions and challenges , 2010, Web Intell. Agent Syst..
[7] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[8] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[9] Yuezhi Zhou,et al. Transparent Computing: A New Paradigm for Pervasive Computing , 2006, UIC.
[10] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[11] Jie Wu,et al. Reliable Re-Encryption in Unreliable Clouds , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[12] Jie Wu,et al. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..
[13] Jie Wu,et al. Achieving fine‐grained access control for secure data sharing on cloud servers , 2011, Concurr. Comput. Pract. Exp..
[14] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[15] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[16] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[17] Yaoxue Zhang,et al. TransOS: a transparent computing-based operating system for the cloud , 2012, Int. J. Cloud Comput..
[18] Brent Waters,et al. Secure attribute-based systems , 2010, J. Comput. Secur..
[19] Mark Weiser. The computer for the 21st century , 1991 .