Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based

D Derler, K Samelin, D Slamanig… - Cryptology ePrint …, 2019 - eprint.iacr.org
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …

On the practicality of cryptographically enforcing dynamic access control policies in the cloud

WC Garrison, A Shull, S Myers… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
The ability to enforce robust and dynamic access controls on cloud-hosted data while
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …

Crypt-DAC: Cryptographically enforced dynamic access control in the cloud

S Qi, Y Zheng - IEEE Transactions on Dependable and Secure …, 2019 - ieeexplore.ieee.org
Enabling cryptographically enforced access controls for data hosted in untrusted cloud is
attractive for many users and organizations. However, designing efficient cryptographically …

Fault adaptive routing in metasurface controller networks

T Saeed, C Skitsas, D Kouzapas… - … on Network on Chip …, 2018 - ieeexplore.ieee.org
HyperSurfaces are a merge of structurally reconfigurable metasurfaces whose
electromagnetic properties can be changed via a software interface, using an embedded …

Vac - Verifier of Administrative Role-Based Access Control Policies

AL Ferrara, P Madhusudan, TL Nguyen… - … 2014, Held as Part of the …, 2014 - Springer
In this paper we present Vac, an automatic tool for verifying security properties of
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …

Policy privacy in cryptographic access control

AL Ferrara, G Fachsbauer, B Liu… - 2015 IEEE 28th …, 2015 - ieeexplore.ieee.org
Cryptographic access control offers selective access to encrypted data via a combination of
key management and functionality-rich cryptographic schemes, such as attribute-based …

Cryptographically enforced role-based access control for NoSQL distributed databases

Y Shalabi, E Gudes - Data and Applications Security and Privacy XXXI …, 2017 - Springer
Abstract The support for Role-Based Access Control (RBAC) using cryptography for NOSQL
distributed databases is investigated. Cassandra is a NoSQL DBMS that efficiently supports …

Access control in publicly verifiable outsourced computation

J Alderman, C Janson, C Cid, J Crampton - Proceedings of the 10th ACM …, 2015 - dl.acm.org
Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources
to delegate computations to more powerful external servers, and to verify the correctness of …

iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption

P Lafourcade, G Marcadet, L Robert - International Conference on …, 2024 - Springer
Abstract Attribute-Based Encryption (ABE) stands as a cryptographic cornerstone, enabling
access control to messages based on user attributes. The security definition of standard ABE …

[PDF][PDF] AN EFFICIENT FILE ACCESS CONTROL TECHNIQUE FOR SHARED CLOUD DATA SECURITY THROUGH KEY-SIGNATURES SEARCH SCHEME

T Lakum, BT REDDY - Journal of Theoretical and Applied Information …, 2022 - jatit.org
Through cloud services, the cloud based users and organizations are storing and sharing
the data in the advanced cloud computing environment. However, the recent cloud data …