Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data
暂无分享,去创建一个
S. Sitharama Iyengar | K. R. Venugopal | Rajkumar Buyya | L. M. Patnaik | K. Meghana | S Raghavendra | P. A. Doddabasappa | C M Geeta | R. Buyya | K. Venugopal | L. Patnaik | S. Iyengar | K. Meghana | S. Raghavendra | C. Geeta
[1] Ma Wenping,et al. An Effective Fuzzy Keyword Search Scheme in Cloud Computing , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[2] Rajkumar Buyya,et al. DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
[3] R. Buyya,et al. MSSS : Most Significant Single-keyword Search over Encrypted Cloud Data , 2015 .
[4] Thomas Fuhrmann,et al. Cryptographically Enforced Permissions for Fully Decentralized File Systems , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
[5] Yuqing Zhang,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[6] Lee Sael,et al. Procedia Computer Science , 2015 .
[7] Hung-Min Sun,et al. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent , 2005, IACR Cryptol. ePrint Arch..
[8] T. Vijayalakshmi,et al. Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2015 .
[9] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[10] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[11] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[12] Mostafa H. Ammar,et al. A file-centric model for peer-to-peer file sharing systems , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[13] K. R. Venugopal,et al. MSIGT: Most Significant Index Generation Technique for cloud environment , 2015, 2015 Annual IEEE India Conference (INDICON).
[14] M. M. A. Hashem,et al. A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture , 2013, ArXiv.
[15] K. R. Venugopal,et al. IGSK: Index Generation on Split Keyword for search over cloud data , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[16] Neelam S. Khan,et al. Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).
[17] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[18] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.