Survey on Two Layer Encryption System
暂无分享,去创建一个
[1] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[2] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[3] Elisa Bertino,et al. Privacy Preserving Delegated Access Control in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.
[4] Elisa Bertino,et al. Towards privacy preserving access control in the cloud , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[5] Elisa Bertino,et al. A privacy-preserving approach to policy-based content dissemination , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[6] Elisa Bertino,et al. Privacy preserving delegated access control in the storage as a service model , 2012, 2012 IEEE 13th International Conference on Information Reuse & Integration (IRI).
[7] Elisa Bertino,et al. Secure and selective dissemination of XML documents , 2002, TSEC.
[8] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[9] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[10] Elisa Bertino,et al. A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[11] Elisa Bertino,et al. Privacy Preserving Policy-Based Content Sharing in Public Clouds , 2013, IEEE Transactions on Knowledge and Data Engineering.
[12] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.