[PDF][PDF] User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments
M Li - 2011 - digital.wpi.edu
Our modern society is increasingly relying on the collection, processing, and sharing of
digital information. There are two fundamental trends:(1) Enabled by the rapid developments …
digital information. There are two fundamental trends:(1) Enabled by the rapid developments …
Achieving fine‐grained access control for secure data sharing on cloud servers
With more and more enterprises sharing their sensitive data on cloud servers, building a
secure cloud environment for data sharing has attracted a lot of attention in both the industry …
secure cloud environment for data sharing has attracted a lot of attention in both the industry …
Privacy-Preserving Attribute-Based Access Control with Non-Monotonic Access Structure
M Ashouri-Talouki, N Kahani… - 2023 7th Cyber Security …, 2023 - ieeexplore.ieee.org
Attribute-Based Encryption (ABE) with non-monotonic access policies provides fine-grained
access control for widespread applications like Cloud-assisted HealthIoT systems. In this …
access control for widespread applications like Cloud-assisted HealthIoT systems. In this …
[图书][B] Overview and Considerations of Access Control Based on Attribute Encryption
VC Hu, VC Hu - 2023 - nvlpubs.nist.gov
Encryption technology can be incorporated into access control mechanisms based on user
identities, user attributes, or resource attributes. Traditional public-key encryption requires …
identities, user attributes, or resource attributes. Traditional public-key encryption requires …
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
Attribute-based encryption (ABE) cryptographically implements fine-grained access control
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …
[HTML][HTML] Statistical privacy protection for secure data access control in cloud
Abstract Cloud Service Providers (CSPs) allow data owners to migrate their data to resource-
rich and powerful cloud servers and provide access to this data by individual users. Some of …
rich and powerful cloud servers and provide access to this data by individual users. Some of …
Pabac: a privacy preserving attribute based framework for fine grained access control in clouds
Several existing access control solutions mainly focus on preserving confidentiality of stored
data from unauthorized access and the storage provider. Moreover, to keep sensitive user …
data from unauthorized access and the storage provider. Moreover, to keep sensitive user …
SABE: a selective attribute-based encryption for an efficient threshold multi-level access control
N Kaaniche, M Laurent - … 15th International Conference on Security and …, 2018 - hal.science
With the emergence of decentralized systems and distributed infrastructures, access control
to outsourced data becomes more complex, as it should be flexible and distinguishable …
to outsourced data becomes more complex, as it should be flexible and distinguishable …
PRShare: A framework for privacy-preserving, interorganizational data sharing
L Idan, J Feigenbaum - ACM Transactions on Privacy and Security, 2022 - dl.acm.org
We consider the task of interorganizational data sharing, in which data owners, data clients,
and data subjects have different and sometimes competing privacy concerns. One real …
and data subjects have different and sometimes competing privacy concerns. One real …
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store
their data into a cloud so as to enjoy scalable services on-demand. Especially for small and …
their data into a cloud so as to enjoy scalable services on-demand. Especially for small and …