Enforcing Subscription-Based Authorization Policies in Cloud Scenarios
暂无分享,去创建一个
Sushil Jajodia | Sabrina De Capitani di Vimercati | Sara Foresti | Giovanni Livraga | S. Vimercati | S. Jajodia | G. Livraga | S. Foresti
[1] Sabrina De Capitani di Vimercati,et al. Data protection in outsourcing scenarios: issues and directions , 2010, ASIACCS '10.
[2] Jason Crampton,et al. Practical and efficient cryptographic enforcement of interval-based access control policies , 2011, TSEC.
[3] Marina Blanton,et al. Efficient Multi-dimensional Key Management in Broadcast Services , 2010, ESORICS.
[4] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[5] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[6] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.
[7] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[8] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[9] Nora Cuppens-Boulahia,et al. Architecture-Aware Adaptive Deployment of Contextual Security Policies , 2010, 2010 International Conference on Availability, Reliability and Security.
[10] Curtis E. Dyreson,et al. A Glossary of Time Granularity Concepts , 1997, Temporal Databases, Dagstuhl.
[11] Sushil Jajodia,et al. Temporal Databases: Research and Practice , 1998 .
[12] Elisa Bertino,et al. An access control model supporting periodicity constraints and temporal reasoning , 1998, TODS.
[13] Heinrich Müller,et al. Effiziente Methoden der geometrischen Modellierung und der wissenschaftlichen Visualisierung, Dagstuhl Seminar 1997 , 1999, Effiziente Methoden der geometrischen Modellierung und der wissenschaftlichen Visualisierung.
[14] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[15] Bart Preneel,et al. Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.
[16] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[17] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[18] Roberto Gorrieri,et al. Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.
[19] Manachai Toahchoodee,et al. On the formalization and analysis of a spatio-temporal role-based access control model , 2011, J. Comput. Secur..
[20] V. Piuri,et al. A comprehensive conceptual system-level approach to fault tolerance in Cloud Computing , 2012, 2012 IEEE International Systems Conference SysCon 2012.
[21] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[22] Mikhail J. Atallah,et al. Incorporating Temporal Capabilities in Existing Key Management Schemes , 2007, ESORICS.
[23] Alexander L. Wolf,et al. Security issues and requirements for Internet-scale publish-subscribe systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[24] Sushil Jajodia,et al. A data outsourcing architecture combining cryptography and access control , 2007, CSAW '07.
[25] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[26] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[27] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[28] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.