Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
On the practicality of cryptographically enforcing dynamic access control policies in the cloud
WC Garrison, A Shull, S Myers… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
The ability to enforce robust and dynamic access controls on cloud-hosted data while
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …
Crypt-DAC: Cryptographically enforced dynamic access control in the cloud
Enabling cryptographically enforced access controls for data hosted in untrusted cloud is
attractive for many users and organizations. However, designing efficient cryptographically …
attractive for many users and organizations. However, designing efficient cryptographically …
Fault adaptive routing in metasurface controller networks
T Saeed, C Skitsas, D Kouzapas… - … on Network on Chip …, 2018 - ieeexplore.ieee.org
HyperSurfaces are a merge of structurally reconfigurable metasurfaces whose
electromagnetic properties can be changed via a software interface, using an embedded …
electromagnetic properties can be changed via a software interface, using an embedded …
Vac - Verifier of Administrative Role-Based Access Control Policies
In this paper we present Vac, an automatic tool for verifying security properties of
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …
Policy privacy in cryptographic access control
Cryptographic access control offers selective access to encrypted data via a combination of
key management and functionality-rich cryptographic schemes, such as attribute-based …
key management and functionality-rich cryptographic schemes, such as attribute-based …
Cryptographically enforced role-based access control for NoSQL distributed databases
Y Shalabi, E Gudes - Data and Applications Security and Privacy XXXI …, 2017 - Springer
Abstract The support for Role-Based Access Control (RBAC) using cryptography for NOSQL
distributed databases is investigated. Cassandra is a NoSQL DBMS that efficiently supports …
distributed databases is investigated. Cassandra is a NoSQL DBMS that efficiently supports …
Access control in publicly verifiable outsourced computation
Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources
to delegate computations to more powerful external servers, and to verify the correctness of …
to delegate computations to more powerful external servers, and to verify the correctness of …
iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption
P Lafourcade, G Marcadet, L Robert - International Conference on …, 2024 - Springer
Abstract Attribute-Based Encryption (ABE) stands as a cryptographic cornerstone, enabling
access control to messages based on user attributes. The security definition of standard ABE …
access control to messages based on user attributes. The security definition of standard ABE …
[PDF][PDF] AN EFFICIENT FILE ACCESS CONTROL TECHNIQUE FOR SHARED CLOUD DATA SECURITY THROUGH KEY-SIGNATURES SEARCH SCHEME
T Lakum, BT REDDY - Journal of Theoretical and Applied Information …, 2022 - jatit.org
Through cloud services, the cloud based users and organizations are storing and sharing
the data in the advanced cloud computing environment. However, the recent cloud data …
the data in the advanced cloud computing environment. However, the recent cloud data …