The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree
暂无分享,去创建一个
[1] Jason Crampton,et al. On key assignment for hierarchical access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[2] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[3] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[4] Laurent Lefèvre,et al. Designing and evaluating an energy efficient Cloud , 2010, The Journal of Supercomputing.
[5] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[6] Jin Li,et al. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.
[7] Li Ming. Grid Dynamic Authorization Model Based on Feedback Mechanism , 2009 .
[8] Ali Miri,et al. Combining Attribute-Based and Access Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[9] He Ye-Ping,et al. Efficient Remote Attestation Mechanism with Privacy Protection , 2011 .
[10] Ye-Ping He,et al. Efficient Remote Attestation Mechanism with Privacy Protection: Efficient Remote Attestation Mechanism with Privacy Protection , 2011 .
[11] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Sushil Jajodia,et al. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing , 2007, SEC.
[13] Lv Zhiquan. Cryptographic Access Control Scheme for Cloud Storage , 2011 .