Managing key hierarchies for access control enforcement: Heuristic approaches
暂无分享,去创建一个
Stelvio Cimato | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Alfredo De Santis | Sara Foresti | Carlo Blundo
[1] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[2] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[3] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[4] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[5] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[6] Ehud Gudes,et al. Designing Secure Indexes for Encrypted Databases , 2005, DBSec.
[7] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[8] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[9] Sushil Jajodia,et al. Selective Data Encryption in Outsourced Dynamic Environments , 2007, Electron. Notes Theor. Comput. Sci..
[10] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[11] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[12] Sushil Jajodia,et al. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing , 2007, SEC.
[13] Alfredo De Santis,et al. Cryptographic key assignment schemes for any access control policy , 2004, Inf. Process. Lett..
[14] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[15] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[16] Sushil Jajodia,et al. A data outsourcing architecture combining cryptography and access control , 2007, CSAW '07.
[17] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[18] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[19] Stelvio Cimato,et al. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios , 2009, SEC.