Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] S Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Cloudsâ€, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS [2] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,†IEEE Trans. Services Computing, Apr.- June 2012. [3] H. Li, Y. Dai, L. Tian, and H. Yang, “IdentityBased Authentication for Cloud Computing,†Proc. First Int’l Conf. Cloud Computing, 2009. [4] C. Gentry, “A Fully Homomorphic Encryption Scheme,†PhD dissertation, Stanford Univ., 2009. [5] A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,†Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), 2010. [6] M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,†Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), 2010. [7] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,†Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2010. [8] G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,†Proc. 17th ACM Conf. Computer and Comm. Security (CCS), 2010. [9] F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,†Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), 2011. [10] S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed Access Control in Clouds,†Proc. IEEE 10th Int’l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011. [11] S.SeenuIropia, R.Vijayalakshmi, “Decentralized Access Control Of Data Stored In Clouds Using Key Policy Attribute Based Encryptionâ€, International Journal Of Invention In Computer Science And Engineering, 2014. [12] http://securesoftwaredev.com/2012/08/20/xacml-inthe-cloud, 2013. [13] R.L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret,†Proc. Seventh Int’l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), 2001. [14] X. Boyen, “Mesh Signatures,†Proc. 26th Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), 2007. [15] D. Chaum and E.V. Heyst, “Group Signatures,†Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), 1991. [16] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures: Achieving AttributePrivacy and Collusion-Resistance,†IACR Cryptology ePrint Archive, 2008. [17] K. Yang, X. Jia, and K. Ren, “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems,†IACR Cryptology ePrint Archive, 2012. [18] W. Wang, Z. Li, R. Owens, and B. Bhargava, “Secure and Efficient Access to Outsourced Data,†Proc. ACM Cloud Computing Security Workshop (CCSW), 2009.
![]() | V2I902.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|