Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Zhiguo Wan, Jun’e Liu, and Robert H. Deng, “SABM: A Hierearchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing”, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, April 2014.
    2. T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” in Proc. IEEE 2013
    3. G.Wang, Q. Liu, and J.Wu, “Hierachical attibutebased encryption for fine-grained access control in cloud storage services,” in Proc. ACM Conf. Computer and Communications Security(ACM CCS), Chicago,2011
    4. J. Li, N. Li, and W. H. Wins borough, “Automated trust negotiation using cryptographic credentials,” in Proc. ACMConf. Computer and Communications Security (CCS), Alexandria, VA, 2005
    5. Rakesh Bobba, Himanshu Khurana & Manoj Prabhakaran, “Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption” in University of Illinois at Urbana-Champaign, July 2009
    6. John Bethencourt, Amit Sahai & Brent Waters, “CiphertextPolicy Attribute-Based Encryption”, in NSF CNS-0524252 US Army Research, in 2009.
    7. A. Ross, “Technical perspective: A chilly sense of security,” Commun. ACM, vol. 52, pp. 90–90, 2009.
    8. D. E. Bell and L. J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation. The MITRE Corporation, Tech. Rep., 2010.
    9. K. J. Biba, Integrity Considerations for Secure Computer Systems The MITRE Corporation, Tech. Rep.2009
    10. H. Harney, A. Colgrove, and P. D. McDaniel, “Principles of policy in secure groups,” in Proc. NDSS, San Diego, CA, 2001.
    11. R. Bobba, H. Khurana, and M. Prabhakaran,“Attribute-sets: A practically motivated enhancement toattribute-based encryption,” in Proc.ESORICS, Saint Malo, France, 2009.
    12. A. Sahai and B. Waters, “Fuzzy identity based encryption,” in Proc. Acvancesin Cryptology—Eurocrypt, 2005, vol. 3494, LNCS, pp.457–473.

Recent Article