Fine-grained assured data deletion scheme based on attribute association
暂无分享,去创建一个
[1] Jianfeng Ma,et al. A Secure Data Self-Destructing Scheme in Cloud Computing , 2014, IEEE Transactions on Cloud Computing.
[2] Fenghua Li,et al. An Attribute-Based Assured Deletion Scheme in Cloud Computing , 2019, Int. J. Inf. Technol. Web Eng..
[3] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Bin Yu,et al. A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption , 2015 .
[5] Radia J. Perlman,et al. File system design with assured delete , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[6] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[7] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Alessandro Sorniotti,et al. Policy-based secure deletion , 2013, IACR Cryptol. ePrint Arch..
[9] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[10] Shigang Chen,et al. On Deletion of Outsourced Data in Cloud Computing , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[11] Xiaojiang Du,et al. Efficient attribute-based encryption with attribute revocation for assured data deletion , 2018, Inf. Sci..
[12] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[13] Tom Coughlin,et al. Disposal of Disk and Tape Data by Secure Sanitization , 2009, IEEE Security & Privacy.
[14] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.
[15] Hubert Ritzdorf,et al. Secure data deletion from persistent media , 2013, CCS.
[16] Li Hui,et al. Secure and Privacy-Preserving Data Storage Service in Public Cloud , 2014 .
[17] Amit Ganatra,et al. Comparative Study of Data Possession Techniques for Data Storage as a Service (DSaaS) , 2013 .