Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication
暂无分享,去创建一个
[1] Herbert J. Mattord,et al. Principles of Information Security, 4th Edition , 2011 .
[2] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[3] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[4] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[5] Sushmita Ruj,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.
[6] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[7] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[8] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[9] Kouichi Sakurai,et al. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems , 2011, ISPEC.
[10] Xiaohua Jia,et al. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013 .
[11] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[12] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[13] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[14] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[15] Ivan Stojmenovic,et al. DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[16] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[17] Manoj Prabhakaran,et al. Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..
[18] C. Anuradha N.Raghavendrasai T.Balamuralikrishna. FUZZY KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING , 2013 .
[19] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[20] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[21] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.