CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
暂无分享,去创建一个
Wen-Guey Tzeng | Jianying Zhou | Yi-Ruei Chen | Cheng-Kang Chu | Jianying Zhou | Wen-Guey Tzeng | Yi-Ruei Chen | Cheng-Kang Chu
[1] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[2] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[3] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[4] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[5] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[6] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[7] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[8] Sheng Zhong,et al. A practical key management scheme for access control in a user hierarchy , 2002, Comput. Secur..
[9] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[10] Indrajit Ray,et al. A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.
[11] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[12] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[13] Jason Crampton,et al. On key assignment for hierarchical access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[14] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[15] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[16] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[17] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[18] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[19] Zhenfu Cao,et al. Multi-use and unidirectional identity-based proxy re-encryption schemes , 2010, Inf. Sci..
[20] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Alfredo De Santis,et al. Efficient provably-secure hierarchical key assignment schemes , 2007, Theor. Comput. Sci..
[22] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[23] Wen-Guey Tzeng,et al. Secure group key management using uni-directional proxy re-encryption schemes , 2011, 2011 Proceedings IEEE INFOCOM.
[24] Zhong Chen,et al. Fully Secure Unidirectional Identity-Based Proxy Re-encryption , 2011, ICISC.
[25] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[26] Zhenfu Cao,et al. Multi-Use Unidirectional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).
[27] Wen-Guey Tzeng,et al. An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.
[28] Brent Waters,et al. Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..
[29] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..