SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Blundo C, Cimato S, Vimercati SDCD, Santis AD, Foresti S, Paraboschi S, Samarati P. Efficient key management for enforcing access control in outsourced scenarios. In Proceedings of the 24th IFIP TC 11 International Information Security Conference (SEC’09). Springer: Pafos, Cyprus, 2009.
  • 2
    Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems 2010; 35(2): 156.
  • 3
    Parno B, Raykova M, Vaikuntanathan V. How to delegate and verify in public: verifiable computation from attribute-based encryption. In Proceedings of the 9th International Conference on Theory of Cryptography (TCC’12). Springer: Taormina, Sicily, Italy, 2012; 422439.
  • 4
    Xu L, Wu X, Zhang X. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In 7th ACM Symposium on Information, Compuer and Communications Security (ASIACCS ’12). ACM: Seoul, Korea, 2012; 8788.
  • 5
    Atallah MJ, Frikken KB, Blanton M. Dynamic and efficient key management for access hierarchies. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). ACM: Alexandria,VA, USA, 2005; 190202.
  • 6
    Hoang AT, Fujino T. Intra-masking dual-rail memory on LUT implementation for tamper-resistant AES on FPGA. In Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays (FPGA’12). ACM: Monterey, California, USA, 2012; 110.
  • 7
    Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. A data outsourcing architecture combining cryptography and access control. In Proceedings of the 2007 ACM Workshop on Computer Security Architecture (CSAW’07). ACM: Fairfax, Virginia, USA, 2007; 6369.
  • 8
    Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. Over-encryption: management of access control evolution on outsourced data. In Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB’07). ACM: Vienna, Austria, 2007; 123134.
  • 9
    Damiani E, Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. Selective data encryption in outsourced dynamic environments. Electronic Notes in Theoretical Computer Science 2007; 168: 127142.
  • 10
    Tang Y, Lee PPC, Lui JCS, Perlman R. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing 2012; 9(6): 903916.
  • 11
    Wang G, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS’10). ACM: Chicago, Illinois, USA, 2010; 735737.
  • 12
    Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th Conference on Data communications (INFOCOM’10). IEEE: San Diego, CA, USA, 2010; 534542.
  • 13
    Zhu Y, Hu H, Ahn GJ, Yu M, Zhao HJ. Comparison-based encryption for fine-grained access control in clouds. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY’12). ACM: San Antonio, Texas, USA, 2012; 105116
  • 14
    Samanthula BK, Howser G, Elmehdwi Y, Madria S. An efficient and secure data sharing framework using homomorphic encryption in the cloud. In 1st International Workshop on Cloud Intelligence (Cloud-I’12). ACM: Istanbul, Turkey, 2012; 8.
  • 15
    Xiong H, Zhang X, Yao D, Wu X, Wen Y. Towards end-to-end secure content storage and delivery with public cloud. In Second ACM Conference on Data and Application Security and Privacy (CODASPY’12). ACM: San Antonio, Texas, USA, 2012; 257266.
  • 16
    Kayem AVDM, Martin P, Akl SG. Enhancing identity trust in cryptographic key management systems for dynamic environments. Security and Communication Networks 2011; 4(1): 7994.
  • 17
    Pang H, Zhang J, Mouratidis K. Scalable verification for outsourced dynamic databases. In Proceedings of the 35th International Conference on Very Large Data Bases (VLDB’09). ACM: Lyon, France, 2009; 802813.
  • 18
    Singh A, Liu L. SHAROES: a data sharing platform for outsourced enterprise storage environments. In Proceedings of the 24th International Conference on Data Engineering (ICDE’08). IEEE: Cancún, México, 2008; 9931002.
  • 19
    Singh A, Srivatsa M, Liu L. Search-as-a-service: outsourced search over outsourced storage. ACM Transactions on the Web 2009; 3(4): 1333.
  • 20
    Bates A, Mood B, Valafar M, Butler K. Towards secure provenance-based access control in cloud environments. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy (CODASPY’13). ACM: San Antonio, Texas, USA, 2013; 277284.
  • 21
    Bessani A, Correia M, Quaresma B, André F, Sousa P. DEPSKY: dependable and secure storage in a cloud-of-clouds. In Proceedings of the Sixth Conference on Computer Systems (EuroSys’11). ACM: Salzburg, Austria, 2011; 3145.
  • 22
    Bravo L, Cheney J, Fundulaki I, Segovia R. Consistency and repair for XML write-access control policies. VLDB Journal 2012; 21(6): 843867.
  • 23
    Hofmann OS, Kim S, Dunn AM, Lee MZ, Witchel E. InkTag: secure applications on an untrusted operating system. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’13). ACM: Houston, Texas, USA, 2013; 265278.