Secure administration of cryptographic role-based access control for large-scale cloud storage systems
DOI10.1016/J.JCSS.2014.04.019zbMath1401.94192OpenAlexW1977242496MaRDI QIDQ2509592
Michael Hitchens, Vijay Varadharajan, Lan Zhou
Publication date: 29 July 2014
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2014.04.019
data storagecloud computingrole-based access controladministrationrole-based encryptioncryptographic RBAC
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Internet topics (68M11)
Related Items (2)
Cites Work
- Unnamed Item
- Key management for content access control in a hierarchy
- Provably secure role-based encryption with revocation mechanism
- Hierarchical ID-Based Cryptography
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Pairing-Friendly Elliptic Curves of Prime Order
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Secure administration of cryptographic role-based access control for large-scale cloud storage systems