Information Technology Reference
In-Depth Information
35. Francesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte,
and Jean-Jacques Quisquater. Efficient remote data possession checking in critical
information infrastructures. IEEE Trans. Knowl. Data Eng. , 20(8):1034-1038, 2008.
36. Hovav Shacham and Brent Waters. Compact proofs of retrievability. IACR
Cryptol. ePrint Arch. , 2008:73, 2008.
37. Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO ,
pages 47-53, 1984.
38. Douglas Stinson. Cryptography: Theory and Practice . Boca Raton, FL: CRC Press, 2005.
39. Guojun Wang, Qin Liu, and Jie Wu. Hierarchical attribute-based encryption for
fine-grained access control in cloud storage services. In Ehab Al-Shaer, Angelos
D. Keromytis, and Vitaly Shmatikov, editors, ACM Conference on Computer and
Communications Security , pages 735-737. New York: ACM, 2010.
40. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public
auditability and data dynamics for storage security in cloud computing. IEEE
Trans. Parallel Distrib. Syst. , 22(5):847-859, 2011.
41. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. Attribute based data
sharing with attribute revocation. In Bruce S. N. Cheung, Lucas Chitturi, Ravi
Sandhu, and Duncan Wong, editors, ACM ASIACCS , pages 261-270, Hong
Kong: ACM, 2010.
42. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai. Realizing fine-grained
and flexible access control to outsourced data with attribute-based crypto-
systems. In Feng Bao and Jian Weng, editors, ISPEC , volume 6672 of Lecture
Notes in Computer Science , pages 83-97. New York: Springer, 2011.
43. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, and Mengyang Yu. Cooperative provable
data possession for integrity verification in multicloud storage. IEEE Trans.
Parallel Distrib. Syst. , 23(12):2231-2244, 2012.
Search WWH ::




Custom Search