Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. kan yang and xiaohua jia “Expressive and efficient and revocable data access control for multi- authority cloud storage” IEEE transaction on parallel and distributed system. July 2014
    2. P. Mell and T. Grance, „„The NIST Definition of Cloud Computing,‟‟ National Institute of Standards and Technology, Gaithersburg, MD, USA, Tech. Rep., 2009
    3. J. Bethencourt, A. Sahai, and B. Waters, „„Cipher text-Policy Attribute-Based ,‟‟ in Proc. IEEE Symp. Security and privacy (S&P‟07), 2007, pp. 321-334.
    4. B. Waters, „„Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,‟‟ in Proc. 4th Int‟l Conf. Practice and Theory in Public Key Cryptography (PKC‟11), 2011, pp. 53-70.
    5. V. Goyal, A. Jain,O. Pandey, andA. Sahai, „„Bounded Cipher text Policy Attribute Based Encryption,‟‟ in Proc. 35th Int‟l Colloquium on Automata, Languages, and Programming (ICALP‟08), 2008, pp. 579-591.
    6. A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B.Waters, „„Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption,‟‟ in Proc. Advances in Cryptology-EUROCRYPT‟10, 2010, pp. 62-91.
    7. M. Chase, „„Multi-Authority Attribute Based Encryption,‟‟ in Proc. 4th Theory of Cryptography Conf. Theory of Cryptography (TCC‟07), 2007, pp.
    8. M. Chase and S.S.M. Chow, „„Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,‟‟ in Proc. 16 th ACM Conf. Computer and Comm. Security (CCS‟09), 2009, pp. 121-130.
    9. A.B. Lewko and B. Waters, „„Decentralizing Attribute-Based Encryption,‟‟ in Proc. Advances in Cryptology-EUROCRYPT‟11, 2011, pp. 568-588.
    10. S. Yu, C. Wang, K. Ren, and W. Lou, „„Attribute Based Data Sharing with Attribute Revocation,‟‟ in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟10), 2010, pp. 261-270.
    11. M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,‟‟ IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan. 2013.
    12. J. Hur and D.K. Noh, „„Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,‟‟ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, Julj,2011
    13. S. Jahid, P. Mittal, and N. Borisov, „„Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,‟‟ in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟11), 2011, pp. 411-415.
    14. S. Ruj, A. Nayak, and I. Stojmenovic, „„DACC: Distributed Access Control in Clouds,‟‟ in Proc. 10th IEEE Int‟l Conf. TrustCom, 2011, pp. 91-98.
    15. K. Yang and X. Jia, „„Attribute-Based Access Control for Multi-Authority Systems in Cloud Storage,‟‟ in Proc. 32th IEEE Int‟l Conf. Distributed Computing Systems (ICDCS‟12), 2012, pp. 1-10
    16. D. Boneh and M.K. Franklin, „„Identity-Based Encryption from the Weil Pairing,‟‟ in Proc. 21st Ann. Int‟l Cryptology Conf.: Advances in Cryptology- CRYPTO‟01, 2001, pp. 213-229. 
    17. A.B. Lewko and B. Waters, „„New Proof Methods for Attribute- Based Encryption: Achieving Full Security through Selective Techniques,‟‟ in Proc. 32st Ann. Int‟l Cryptology Conf.: Advances in Cryptology - CRYPTO‟12, 2012, pp. 180-198

Recent Article