[PDF][PDF] Over-encryption: Management of access control evolution on outsourced data
Data outsourcing is emerging today as a successful paradigm allowing users and
organizations to exploit external services for the distribution of resources. A crucial problem …
organizations to exploit external services for the distribution of resources. A crucial problem …
[PDF][PDF] A review on data security in cloud computing
Cloud computing is an Internet-based computing and next stage in evolution of the internet.
It has received significant attention in recent years but security issue is one of the major …
It has received significant attention in recent years but security issue is one of the major …
{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}
As the Internet of Things (IoT) emerges over the next decade, develo** secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
Encryption policies for regulating access to outsourced data
Current access control models typically assume that resources are under the strict custody of
a trusted party which monitors each access request to verify if it is compliant with the …
a trusted party which monitors each access request to verify if it is compliant with the …
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …
A lightweight secure data sharing scheme for mobile cloud computing
R Li, C Shen, H He, X Gu, Z Xu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the popularity of cloud computing, mobile devices can store/retrieve personal data from
anywhere at any time. Consequently, the data security problem in mobile cloud becomes …
anywhere at any time. Consequently, the data security problem in mobile cloud becomes …
On the practicality of cryptographically enforcing dynamic access control policies in the cloud
WC Garrison, A Shull, S Myers… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
The ability to enforce robust and dynamic access controls on cloud-hosted data while
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and
organizations to exploit external servers for the distribution of resources. Some of the most …
organizations to exploit external servers for the distribution of resources. Some of the most …
Cloud computing security: challenges and future trends
Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy
clients' requirements for computing resources such as services, applications, networks …
clients' requirements for computing resources such as services, applications, networks …
The issues of cloud computing security in high-speed railway
X Tan, B Ai - Proceedings of 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Cloud computing has brought new changes and opportunities to IT industry. It is the result of
the evolution of a variety of techniques. And the railway department will use the cloud …
the evolution of a variety of techniques. And the railway department will use the cloud …