Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] S. Ruj, Member, IEEE, M. Stojmenovic, Member, IEEE, and A.Nayak, Senior Member, IEEE"Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds",Feb-2014,pp.384-394 [2] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving AccessControl with Authentication for Securing Data in Clouds,†Proc. IEEE/ACM Int’l Symp.Cluster, Cloud and Grid Computing, pp.556- 563, 2012. [3] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secureand Dependable Storage Services in Cloud Computing,†IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.- June2012. [4] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “FuzzyKeyword Search Over Encrypted Data in Cloud Computing,†Proc. IEEE INFOCOM, pp. 441-445, 2010. [5] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,†Proc.14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010. [6] H. Li, Y. Dai, L. Tian, and H. Yang, “IdentityBasedAuthentication for Cloud Computing,†Proc. First Int’l Conf. Cloud Computing (CloudCom), pp. 157-166, 2009. [7] C. Gentry, “A Fully Homomorphic Encryption Scheme,†PhDdissertation, Stanford Univ., http://www.crypto.stanford.edu/craig,2009. [8] R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing, â€HP TechnicalReport HPL- 2011- 38,http://www.hpl.hp.com/techreports/2011/HPL2011-38.html, 2013. [9] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: TheEssential of Bread and Butter of Data Forensics in Cloud Computing,†Proc. Fifth ACM Symp.Information, Computer andComm. Security (ASIACCS), pp. 282- 292, 2010. [10] D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,†Proc.15th Nat’l Computer Security Conf.,
![]() | V2I1124.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|