Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”Proc. 13th ACM Conf. Computer and Comm. Security (CCS ‟ 06),pp. 89-98, 2006. [2] Ming LiShucheng Yu, Yao Zheng,Kui Ren, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using AttributeBased Encryption”, IEEE transactions on parallel and distributed systems, vol. 24, no. 1, january 2013. [3] Y. Zheng, “Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption”, master‟ s thesis, Worcester Polytechnic Inst., 2011. [4] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes”, 2009. [5] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS ‟ 10), 2010. [6] S. Narayan, M. Gagne´, and R. Safavi-Naini, “Privacy Preserving EHR System Using Attribute-Based Infrastructure”, Proc. ACM Cloud Computing Security Workshop (CCSW ‟ 10), pp. 47-52, 2010. [7] J. Bethencourt, A. Sahai, and B. Waters, “CiphertextPolicy Attribute-Based Encryption”, Proc. IEEE Symp. Security and Privacy (SP ‟ 07), pp. 321-334, 2007. [8] Q.Wang et al.,“Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,” Proc. ESORICS „09, Sept. 2009, pp. 355–70. [9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM‟ 10, 2010. [10] A. Boldyreva, V. Goyal, and V. Kumar, “Identitybased encryption with efficient revocation,” in ACM CCS, ser. CCS ‟ 08, 2008, pp.417–426. [11] J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints, 2010 [12] J. Bethencourt, A. Sahai, and B. Waters,“Ciphertext-policy attribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334. [13] Melissa Chase “Multi-authority Attribute based Encryption,” Computer Science Department Brown University Providence, RI 02912
![]() | V2I1005.pdf |