Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
Identity-Based Encryption from the Weil Pairing, Advances in Cryptology CRYPTO 2001, pp.213-229, 2001. ,
DOI : 10.1007/3-540-44647-8_13
Secure cloud computing: Benefits, risks and controls, 2011 Information Security for South Africa, pp.1-9, 2011. ,
DOI : 10.1109/ISSA.2011.6027519
Improving privacy and security in multi-authority attribute-based encryption, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.121-130, 2009. ,
DOI : 10.1145/1653662.1653678
Controlling data in the cloud, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.85-90, 2009. ,
DOI : 10.1145/1655008.1655020
Transparent data encryption?solution for security of database contents, 2013. ,
Over-encryption: Management of access control evolution on outsourced data, Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB '07, pp.123-134, 2007. ,
Fundamentals of Database Systems [With Access Code, 2011. ,
Trust Model Engines in Cloud Computing, 2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, pp.465-470, 2012. ,
DOI : 10.1109/SYNASC.2012.57
Transparent access on encrypted data distributed over multiple cloud infrastructures, CLOUD COMPUTING 2013 The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, pp.201-207, 2013. ,
Broadcast Encryption, Lecture Notes in Computer Science, vol.773, pp.480-491, 1994. ,
DOI : 10.1007/3-540-48329-2_40
Design and auditing of Cloud computing security, 2010 Fifth International Conference on Information and Automation for Sustainability, pp.292-297, 2010. ,
DOI : 10.1109/ICIAFS.2010.5715676
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes, 2009. ,
Guidelines on security and privacy in public cloud computing, NIST special publication, vol.800, p.144, 2011. ,
DOI : 10.6028/NIST.SP.800-144
Establishing Trust in Cloud Computing, IT Professional, vol.12, issue.5, pp.20-27, 2010. ,
DOI : 10.1109/MITP.2010.128
Efficient Semi-static Secure Broadcast Encryption Scheme, Pairing-Based Cryptography Pairing 2013, pp.62-76, 2014. ,
DOI : 10.1007/978-3-319-04873-4_4
Cloud security challenges, 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp.88-91, 2012. ,
DOI : 10.1109/TSSA.2012.6366028
A cryptographic key management solution for hipaa privacy/security regulations, Information Technology in Biomedicine IEEE Transactions on, vol.12, issue.1, pp.34-41, 2008. ,
Analysis of antennas and scatterers with nonlinear loads, IEEE Transactions on Antennas and Propagation, vol.24, issue.2, pp.131-143, 2013. ,
DOI : 10.1109/TAP.1976.1141328
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. Theory in practice, 2009. ,
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts, International Journal of Information Security, vol.33, issue.5, pp.251-265, 2013. ,
DOI : 10.1007/s10207-013-0190-0
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011. ,
DOI : 10.1145/2043556.2043566
The security of cloud computing system enabled by trusted computing technology, 2010 2nd International Conference on Signal Processing Systems, pp.2-11, 2010. ,
DOI : 10.1109/ICSPS.2010.5555234
Processing analytical queries over encrypted data, Proceedings of the VLDB Endowment, vol.6, issue.5, pp.289-300, 2013. ,
DOI : 10.14778/2535573.2488336
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.6507
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010. ,
DOI : 10.1109/INFCOM.2010.5462174
Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.261-270, 2010. ,
DOI : 10.1145/1755688.1755720
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data, IEEE INFOCOM 2014, IEEE Conference on Computer Communications, 2013. ,
DOI : 10.1109/INFOCOM.2014.6847976
Enforcing Role-Based Access Control for Secure Data Storage in the Cloud, The Computer Journal, vol.54, issue.10, pp.1675-1687, 2011. ,
DOI : 10.1093/comjnl/bxr080
On efficient ciphertext-policy attribute based encryption and broadcast encryption, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.753-755, 2010. ,
DOI : 10.1145/1866307.1866420
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.538-546, 2008. ,
DOI : 10.1109/INFOCOM.2008.102