1 |
Sung-Jae Jung and Yu-Mi Bae, "Trend analysis of Threats and Technologies for Cloud Security," Journal of Security Engineering, Vol.10, no.2, pp.199-212, Apr. 2013.
|
2 |
P. Mell and T. Grance, "The NIST Definition of Cloud Computing," NIST Special Publication 800-145. Sep. 2011.
|
3 |
Kevin Walsh, John Manferdelli, "Intra-Cloud and Inter-Cloud Authentication," IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 1-8, Sep. 2017.
|
4 |
Primoz Cigoj, Borka Jerman Blazie and Tomaz Klobucar. "an approach in the design of common authentication solution for a multi-platfotm cloud environment," 5th International Conference on Cloud Computing and Service Science. pp. 365-372. Jan. 2015.
|
5 |
H.A. Dinesha and V.K. Agrawal, "Multi-level authentication technique for accessing cloud services," Computing, Communication and Applications( ICCCA), 2012 International Conference on, pp. 1-4, Feb, 2012.
|
6 |
C. Chen, J. Chen, H. Lim, Z. Ahang, and D. Feng, "Combined public key schemes: The case of ABE and ABS," in Proc. Provable Secure, Chengdu, China, pp. 53-69, Sep. 2012.
|
7 |
H.Lui, Y. Huang, and K. Liu, "Secure sharing of personal health records in cloud computing: ciphertext policy attribute-based singncryption," Future Generation Computer System, vol. 52.pp. 67-76, Nov. 2015.
DOI
|
8 |
Y. Sreenivasa, "A Secure and efficient ciphertext policy attribute-based signcryption for personal health records sharing cloud computing," Future Generation Computer System, Vol.67, pp.133-151, Feb. 2017.
DOI
|
9 |
G. Yu, and F. Cao, "Attribute-based signcryption with hybrid access policy," Peer-to-Peer Networking and Applications, Vol.20, no.1 pp.1-9, Nov. 2015.
|
10 |
G. Han, W. Susilo, Y. Mu, Y. Zhou, and A. Au, "Improving privacy and security in decentralized CP-ABE," IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp.665-678, Dec. 2014.
DOI
|
11 |
J Li, F. Chen, W. Li, F. Jia, F.Ma, and J. Lou, "Fine-grained access control system based on outsourced attribute-based encryption," in proc. Coputer Security-ESORICS 2013, Egham, UK, pp 592-609, Sep. 2013.
|
12 |
A. Lewko and B. Waters, "Decentralizing attribute-based encryption," in proc. Advances in Cryptology-EUROCRYPT 2011, Tallinn, Estonia, pp.568-588, May.2011.
|
13 |
S. Ruj, M. Stojmenovic, and A. Nayak, "Decentralized access control with anonymous authentication of data stored in clouds," IEEE Transaction on Parallel and Distributed Systems, Vol.20, No. 2, pp.384-394, Feb. 2013.
|
14 |
K. Yang, H. Jia, and K. Ren, "DAC-MACS: Effective data access control for multi-authority cloud storage systems," IEEE Transactions on Information Forensics and Security, Vol.8, No.11, pp.1790-1801, Jul. 2013.
DOI
|
15 |
G. Wang, Q. Lui, J. Wu, and Y. Guo, "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Computer & Security, vol.30, no.5, pp. 320-331, Jul. 2011.
DOI
|
16 |
Z. Lai, H. Deng, W.Guan, and J. Weng, "Attribute-based encryption with verifiable outsourced decryption," IEEE Transactions on information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, Jul. 2013.
DOI
|
17 |
H. Zhang, F. Chen, J. Li, S. Wong, H. Li, and I. You, "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing," Information Sciences, vol. 379, pp. 42-61, Feb. 2017.
DOI
|
18 |
Q. Huang, X. Yang, and C. Wang, "Secure Data Access Control with Ciphertext Update and Computation Outsourcing," IEEE Access, vol.5, pp.12941-12950, Jul. 2017.
DOI
|