Policy Privacy in Cryptographic Access Control
暂无分享,去创建一个
Georg Fuchsbauer | Bin Liu | Anna Lisa Ferrara | Bogdan Warinschi | Bin Liu | A. L. Ferrara | B. Warinschi | Georg Fuchsbauer | G. Fuchsbauer
[1] Georg Fuchsbauer,et al. Cryptographically Enforced RBAC , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.
[2] Giuseppe Cattaneo,et al. Design and Implementation of a Transparent Cryptographic File System for Unix , 2007 .
[3] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[4] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[5] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[6] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[7] Craig A. N. Soules,et al. Metadata Efficiency in Versioning File Systems , 2003, FAST.
[8] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[9] Jong Hwan Park,et al. Inner-product encryption under standard assumptions , 2011, Des. Codes Cryptogr..
[10] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[11] Sean W. Smith,et al. Attribute-Based Publishing with Hidden Credentials and Hidden Policies , 2007, NDSS.
[12] Gail-Joon Ahn,et al. Cryptographic role-based security mechanisms based on role-key hierarchy , 2010, ASIACCS '10.
[13] Tatsuaki Okamoto,et al. Hierarchical Predicate Encryption for Inner-Products , 2009, ASIACRYPT.
[14] Martín Abadi,et al. Security analysis of cryptographically controlled access to XML documents , 2008, J. ACM.
[15] Scott Shenker,et al. Attested append-only memory: making adversaries stick to their word , 2007, SOSP.
[16] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[17] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[18] David K. Gifford. Cryptographic sealing for information secrecy and authentication , 1982, CACM.
[19] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[20] Mihir Bellare,et al. Key-Privacy in Public-Key Encryption , 2001, ASIACRYPT.
[21] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[22] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[23] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[24] Tatsuaki Okamoto,et al. Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[25] Peter Kulchyski. and , 2015 .
[26] Alfredo De Santis,et al. Efficient provably-secure hierarchical key assignment schemes , 2007, Theor. Comput. Sci..
[27] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[28] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[29] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[30] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[31] Shai Halevi,et al. Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control , 2005, IACR Cryptol. ePrint Arch..
[32] Jason Crampton,et al. Cryptographic Enforcement of Role-Based Access Control , 2010, Formal Aspects in Security and Trust.
[33] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[34] Michael K. Reiter,et al. Efficient Byzantine-tolerant erasure-coded storage , 2004, International Conference on Dependable Systems and Networks, 2004.
[35] Craig A. N. Soules,et al. Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[36] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[37] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[38] Georg Fuchsbauer,et al. Policy-Based Signatures , 2013, IACR Cryptol. ePrint Arch..
[39] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[40] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[41] Christian Damsgaard Jensen,et al. Cryptographic access control in a distributed file system , 2003, SACMAT '03.