Distributed Authentication for Federated Clouds in Secure Cloud Data Storage
暂无分享,去创建一个
[1] Kouichi Sakurai,et al. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control , 2011, ICISC.
[2] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[3] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[4] Naranker Dulay,et al. Shared and Searchable Encrypted Data for Untrusted Servers , 2008, DBSec.
[5] Matei Ciobanu Morogan,et al. Suggesting a Method to Improve Encryption Key Management in Wireless Sensor Networks , 2015 .
[6] P. Hartel,et al. Conjunctive Wildcard Search over Encrypted Data , 2011, Secure Data Management.
[7] Ramalingam Sugumar,et al. Symmetric Encryption Algorithm to Secure Outsourced Data in Public Cloud Storage , 2015 .
[8] Tomi Reiman,et al. A Survey on Cloud Computing Security Issues , 2013 .
[9] Jin Li,et al. Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud , 2012, NSS.
[10] K. Venkataramana,et al. A threshold secure data sharing scheme for federated clouds , 2012, ArXiv.
[11] Liana L. Fong,et al. Cloud federation in a layered service model , 2012, J. Comput. Syst. Sci..
[12] Abdul Rahman Ramli,et al. Implementation of a parallel XTS encryption mode of operation , 2014 .
[13] B. Justus Rabi,et al. Enhanced MixColumn Design for AES Encryption , 2015 .
[14] Eric Pardede,et al. Using Multi Shares for Ensuring Privacy in Database-as-a-Service , 2011, 2011 44th Hawaii International Conference on System Sciences.
[15] Rajkumar Buyya,et al. InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.
[16] Lingyu Wang,et al. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage , 2016, IEEE Transactions on Computers.
[17] Yi Lin,et al. Ensure Data Security in Cloud Storage , 2011, 2011 International Conference on Network Computing and Information Security.
[18] A. Umamakeswari,et al. Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption , 2015 .
[19] Mohammed Ali Hussain,et al. Performance and Security Analysis for Image Encryption using Key Image , 2015 .