Privacy Preserving Access Control with Authentication for Securing Data in Clouds
暂无分享,去创建一个
[1] Ahmad-Reza Sadeghi,et al. Token-Based Cloud Computing , 2010, TRUST.
[2] Ivan Stojmenovic,et al. DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[4] Kouichi Sakurai,et al. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems , 2011, ISPEC.
[5] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[6] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[7] Prateek Mittal,et al. EASiER: encryption-based access control in social networks with efficient revocation , 2011, ASIACCS '11.
[8] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[9] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[10] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[11] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[12] Bu-Sung Lee,et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[13] Manoj Prabhakaran,et al. Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..
[14] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[15] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[16] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[17] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[18] Xavier Boyen,et al. Mesh Signatures , 2007, EUROCRYPT.
[19] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[20] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[21] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[22] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[23] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[25] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[26] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[27] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.