Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
暂无分享,去创建一个
Prajakta A. Satarkar | Jayant D. Bokefode | Dattatray G. Modani | Avdhut S. Bhise | J. Bokefode | A. Bhise | P. Satarkar | D. G. Modani
[1] Raman Maini,et al. COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .
[2] Ravi S. Sandhu,et al. The RRA97 model for role-based administration of role hierarchies , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[3] Ravi S. Sandhu,et al. The ARBAC99 model for administration of roles , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[4] Ravi S. Sandhu,et al. The ARBAC97 model for role-based administration of roles: preliminary description and outline , 1997, RBAC '97.
[5] Vasudeva Varma,et al. Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.
[6] Hossam Faris,et al. Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review , 2014 .
[7] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[8] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[9] William Stallings,et al. Cryptography and network security (2nd ed.): principles and practice , 1998 .
[10] Bhagyashri Katole,et al. Principle Elements and Framework of Internet of Things , 2013 .
[11] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Elisa Bertino,et al. The next generation of access control models: Do we need them and what should they be? , 2001 .
[14] Teng Zhang,et al. A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[15] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[16] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[17] R. Davis,et al. The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.
[18] W. L. Ruzzo,et al. Analysis of DAC MAC RBAC Access Control based Models for Security , 2017 .
[19] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[20] D BokefodeJayant.,et al. Analysis of DAC MAC RBAC Access Control based Models for Security , 2014 .
[21] S. Nirmala,et al. Data Security Issues and Challenges in Cloud Computing , 2015 .
[22] Daniel K. Fisher. Rapid Deployment of Internet-Connected Environmental Monitoring Devices , 2014, IOT 2014.