Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage
暂无分享,去创建一个
[1] Robert H. Deng,et al. Dynamic Secure Cloud Storage with Provenance , 2012, Cryptography and Security.
[2] Bertram Ludäscher,et al. Efficient provenance storage over nested data collections , 2009, EDBT '09.
[3] Thomas Heinis,et al. Efficient lineage tracking for scientific workflows , 2008, SIGMOD Conference.
[4] Shouhuai Xu,et al. An Access Control Language for a General Provenance Model , 2009, Secure Data Management.
[5] Shouhuai Xu,et al. A roadmap for privacy-enhanced secure data provenance , 2014, Journal of Intelligent Information Systems.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Jaehong Park,et al. A provenance-based access control model for dynamic separation of duties , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[8] Martin Doerr,et al. CRMdig: A Generic Digital Provenance Model for Scientific Observation , 2011, TaPP.
[9] Jin Li,et al. Digital provenance: Enabling secure data forensics in cloud computing , 2014, Future Gener. Comput. Syst..
[10] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[11] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[12] James Cheney,et al. A Graph Model of Data and Workflow Provenance , 2010, TaPP.
[13] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[14] Rasool Jalili,et al. GTHBAC: A Generalized Temporal History Based Access Control Model , 2010, Telecommun. Syst..
[15] Jennifer Widom,et al. Databases with uncertainty and lineage , 2008, The VLDB Journal.
[16] Vladimiro Sassone,et al. A logical framework for history-based access control and reputation systems , 2008, J. Comput. Secur..
[17] Jaehong Park,et al. A provenance-based access control model , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[18] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[19] Margo I. Seltzer,et al. Securing Provenance , 2008, HotSec.
[20] Anindya Banerjee,et al. History-Based Access Control and Secure Information Flow , 2004, CASSIS.
[21] Elisa Bertino,et al. Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[22] Christoph Bier. How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective , 2013, 2013 IEEE Security and Privacy Workshops.