+

Deng et al., 2014 - Google Patents

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data

Deng et al., 2014

View PDF
Document ID
16481050689222599165
Author
Deng H
Wu Q
Qin B
Chow S
Domingo-Ferrer J
Shi W
Publication year
Publication venue
Proceedings of the 9th ACM symposium on Information, computer and communications security

External Links

Snippet

Most existing proposals for access control over outsourced data mainly aim at guaranteeing that the data are only accessible to authorized requestors who have the access credentials. This paper proposes TRLAC, an a posteriori approach for tracing and revoking leaked …
Continue reading at crises2-deim.urv.cat (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Similar Documents

Publication Publication Date Title
Miao et al. Multi-authority attribute-based keyword search over encrypted cloud data
Li et al. Full verifiability for outsourced decryption in attribute based encryption
Ning et al. CryptCloud $^+ $+: secure and expressive data access control for cloud storage
Jung et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
CN108989026B (en) A method for revocation of user attributes in publish/subscribe environment
Yu et al. Attribute based data sharing with attribute revocation
Yang et al. Enabling efficient access control with dynamic policy updating for big data in the cloud
Sun et al. Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage
Zhou et al. Privacy-preserved access control for cloud computing
Deng et al. Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data
Nasiraee et al. Privacy-preserving distributed data access control for CloudIoT
Xu et al. A CP-ABE scheme with hidden policy and its application in cloud computing
Xiong et al. A secure re‐encryption scheme for data services in a cloud computing environment
Sabitha et al. Multi-level on-demand access control for flexible data sharing in cloud
Cui et al. Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database
Aljafer et al. A brief overview and an experimental evaluation of data confidentiality measures on the cloud
Li et al. Multi-user searchable encryption with a designated server
Park et al. PKIS: practical keyword index search on cloud datacenter
Guo et al. CD‐ABSE: Attribute‐Based Searchable Encryption Scheme Supporting Cross‐Domain Sharing on Blockchain
Zhang et al. Privacy‐Preserving Attribute‐Based Keyword Search with Traceability and Revocation for Cloud‐Assisted IoT
Weng et al. Efficient Registered Attribute Based Access Control with Same Sub-policies in Mobile Cloud Computing
Zhou et al. Fine‐Grained Attribute‐Based Multikeyword Search for Shared Multiowner in Internet of Things
Zhang et al. A secure enhanced key-policy attribute-based temporary keyword search scheme in the cloud
Wang et al. Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Wang et al. Attribute-based encryption with efficient keyword search and user revocation
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载