SECO: Secure and scalable data collaboration services in cloud computing
暂无分享,去创建一个
Minglu Li | Yuan Luo | Yanmin Zhu | Yingying Chen | Jiadi Yu | Xin Dong
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Joonsang Baek,et al. Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.
[4] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[5] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[6] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[7] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[8] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[11] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[12] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[13] Sabrina De Capitani di Vimercati,et al. Data protection in outsourcing scenarios: issues and directions , 2010, ASIACCS '10.
[14] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[15] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[16] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[17] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[18] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[19] Minglu Li,et al. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing , 2014, Comput. Secur..
[20] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[21] Jie Ling,et al. A Quasi IBE Identity Authentication Scheme in a Cloud Computing Environment , 2013 .
[22] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[23] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[24] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[25] Dan Boneh,et al. Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption , 2013, CRYPTO.
[26] Yi Mu,et al. Identity-Based Broadcasting , 2003, INDOCRYPT.
[27] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[28] Minglu Li,et al. Achieving secure and efficient data collaboration in cloud computing , 2013, 2013 IEEE/ACM 21st International Symposium on Quality of Service (IWQoS).
[29] Jacob R. Lorch,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OSDI '02.
[30] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.
[31] Vinod Vaikuntanathan,et al. Functional Encryption: New Perspectives and Lower Bounds , 2013, IACR Cryptol. ePrint Arch..
[32] Dalit Naor,et al. Broadcast Encryption , 1993, Encyclopedia of Multimedia.
[33] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[34] R. Kalaiselvi,et al. SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .
[35] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[36] Brent Waters,et al. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) , 2009, EUROCRYPT.
[37] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[38] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[39] Anshu Parashar,et al. Secure User Data in Cloud Computing Using Encryption Algorithms , 2013 .