Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
1. Kui Ren, Cong Wang, and Qian Wang, “Security Challenges for the Public Cloud”, Internet Computing, IEEE, Vol. 16, Issue 1,Jan.-Feb. 2012. 2. Y. Lu and G. Tsudik, “Privacy-Preserving Cloud Database Querying”, Journal of Internet Services and Information Security (JISIS), Vol. 1, No. 4, November 2011. 3. Siani Pearson, Yun Shen, Miranda Mowbray, “A Privacy Manager for Cloud Computing”, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings 4. Jian Wang, Yan Zhao, Shuo Jiang, Jiajin Le, “Providing privacy preserving in cloud computing”, Test and Measurement, vol. 2, ICTM '09, International Conference, 2009. 5. Miao Zhou , Yi Mu , Willy Susilo , Jun Yan , Liju Dong, “Privacy enhanced data outsourcing in the cloud, Journal of Network and Computer Applications”, vol. 35, issue 4, pp. 1367–1373, 2012. 6. Qin Liu, Guojun Wang, Jie Wu, “Secure and privacy preserving keyword searching for cloud storage services”, Journal of Network and Computer Applications, vol. 35, pp. 927–933, 2012. 7. Haibo Hu, Jianliang Xu , Chushi Ren , Byron Choi, “Processing private queries over untrusted data cloud through privacy homomorphism” , Data Engineering (ICDE), 2011. 8. Marten Van Dijk, Ari Juels, “On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing”, IACR Cryptology eprint Archive, 2010. 9. Dr. Alexander Benlian, Prof. Dr. Thomas Hess, Prof. Dr. Peter Buxmann, “Drivers of SaaS-Adoption – An Empirical Study of Different Application Type”, Business & Information Systems Engineering, Vol. 1, Issue 5, pp 357-369, October 2009. 10. Shucheng Yu Cong Wang, Kui Ren , Wenjing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”, INFOCOM, 2010 Proceedings IEEE. 11. Vipul Goyal,Omkant Pandey, Amit Sahai, Brent Waters , “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data”, Proceeding CCS '06 Proceedings of the 13th ACM conference on Computer and communications security Pages 89 - 98 ,ACM New York, NY 12. John Bethencourt, Amit Sahai, Brent Waters, “Ciphertext-Policy Attribute-Based Encryption, Security and Privacy”, 2007. 13. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryptionof ABE ciphertexts,” in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011. 14. Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryption”, IEEE Transaction on Information Forensics and Security, vol. 8, no. 8, August 2013
![]() | V1I52.pdf |