Efficient Key Management for Enforcing Access Control in Outsourced Scenarios
暂无分享,去创建一个
Stelvio Cimato | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Alfredo De Santis | Sara Foresti | Carlo Blundo
[1] Alfredo De Santis,et al. Cryptographic key assignment schemes for any access control policy , 2004, Inf. Process. Lett..
[2] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[3] Sushil Jajodia,et al. Over-Encryption: Management of Access Control Evolution on Encrypted Data , 2007, VLDB 2007.
[4] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[5] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[6] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[7] Sushil Jajodia,et al. Selective Data Encryption in Outsourced Dynamic Environments , 2007, Electron. Notes Theor. Comput. Sci..
[8] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[9] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[10] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[11] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[12] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.