Information Technology Reference
In-Depth Information
20. Ari Juels and Burton S. Kaliski Jr. Pors: proofs of retrievability for large files.
In Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors,
ACM Conference on Computer and Communications Security , pages 584-597.
New York: ACM, 2007.
21. Seny Kamara and Kristin Lauter. Cryptographic cloud storage. In Radu Sion,
Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako,
and Francesc Sebé, editors, Financial Cryptography Workshops , volume 6054
of  Lecture Notes in Computer Science , pages 136-149. New York: Springer, 2010.
22. D. Richard Kuhn, Edward J. Coyne, and Timothy R. Weil. Adding attributes to
role-based access control. IEEE Computer , 43(6):79-81, 2010.
23. Allison B. Lewko and Brent Waters. Decentralizing attribute-based encryption.
In Kenneth G. Paterson, editor, EUROCRYPT , volume 6632 of Lecture Notes in
Computer Science , pages 568-588. New York: Springer, 2011.
24. Ming Li, Shucheng Yu, Kui Ren, and Wenjing Lou. Securing personal health
records in cloud computing: patient-centric and fine-grained data access con-
trol in multi-owner settings. In Sushil Jajodia and Jianying Zhou, editors,
SecureComm , pages 89-106, Singapore, 2010.
25. Hemanta K. Maji, Manoj Prabhakaran, and Mike Rosulek. Attribute-based sig-
natures: achieving attribute-privacy and collusion-resistance. IACR Cryptology
ePrint Archive , 2008:328, 2008.
26. Michael Naehrig, Kristin Lauter, and Vinod Vaikuntanathan. Can homomorphic
encryption be practical? In Christian Cachin and Thomas Ristenpart, editors,
CCSW , pages 113-124. New York: ACM, 2011.
27. Rafail Ostrovsky, Amit Sahai, and Brent Waters. Attribute-based encryption
with non-monotonic access structures. In Peng Ning, Sabrina De Capitani
di Vimercati, and Paul F. Syverson, editors, ACM Conference on Computer and
Communications Security , pages 195-203. New York: ACM, 2007.
28. Pascal Paillier. Public-key cryptosystems based on composite degree residuosity
classes. In Jacques Stern, editor, EUROCRYPT , volume 1592 of Lecture Notes in
Computer Science , pages 223-238. New York: Springer, 1999.
29. W. Pugh. Skip lists: a probablistic alternative to balanced trees. Commun. ACM ,
33(6):668-676, 1990.
30. R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy
homomorphisms. In Richard Lipton, David Dobkin, and Anita Jones, editors,
Foundations of Secure Computation , Orlando, FL, 1978.
31. Sushmita Ruj, Amiya Nayak, and Ivan Stojmenovic. DACC: distributed access
control in clouds. In Huaimin Wang, Stephen R. Tate, and Yang Xiang, editors,
Proceedings of IEEE TrustCom , pages 91-98, Changsha, China, 2011.
32. Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak. Privacy preserving
access control with authentication for securing data in clouds. In CCGRID ,
pages 556-563. New York: IEEE, 2012.
33. Ahmad-Reza Sadeghi, Thomas Schneider, and Marcel Winandy. Token-based
cloud computing. In Alessandro Acquisti, Sean W. Smith, and Ahmad-Reza
Sadeghi, editors, TRUST , volume 6101 of Lecture Notes in Computer Science ,
pages 417-429. New York: Springer, 2010.
34. Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In Ronald
Cramer, editor, EUROCRYPT , volume 3494 of Lecture Notes in Computer Science ,
pages 457-473. New York: Springer, 2005.
Search WWH ::




Custom Search