ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment
暂无分享,去创建一个
Fagen Li | Ping Wang | Alzubair Hassan | Rashad Elhabob | Nabeil Eltayieb | Ping Wang | Fagen Li | Rashad Elhabob | Alzubair Hassan | Nabeil Eltayieb
[1] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[2] Xiaohui Liang,et al. An Efficient and Secure User Revocation Scheme in Mobile Social Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[3] Prateek Mittal,et al. EASiER: encryption-based access control in social networks with efficient revocation , 2011, ASIACCS '11.
[4] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[5] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[6] Luis Rodero-Merino,et al. A break in the clouds: towards a cloud definition , 2008, CCRV.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Athanasios V. Vasilakos,et al. SeDaSC: Secure Data Sharing in Clouds , 2017, IEEE Systems Journal.
[9] Junbeom Hur,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[10] Yanli Ren,et al. Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations , 2015, Int. J. Distributed Sens. Networks.
[11] Bert den Boer. Diffie-Hellman is as Strong as Discrete Log for Certain Primes , 1988, CRYPTO.
[12] Wen-Guey Tzeng,et al. Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[13] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[14] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[15] Shahaboddin Shamshirband,et al. Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.
[16] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[17] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[19] Athanasios V. Vasilakos,et al. Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things , 2017, IEEE Cloud Computing.
[20] Jengnan Tzeng,et al. Re-Encryption Method Designed by Row Complete Matrix , 2012 .
[21] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[22] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[23] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[24] Elisa Bertino,et al. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.