Deng et al., 2014 - Google Patents
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced dataDeng et al., 2014
View PDF- Document ID
- 16481050689222599165
- Author
- Deng H
- Wu Q
- Qin B
- Chow S
- Domingo-Ferrer J
- Shi W
- Publication year
- Publication venue
- Proceedings of the 9th ACM symposium on Information, computer and communications security
External Links
Snippet
Most existing proposals for access control over outsourced data mainly aim at guaranteeing that the data are only accessible to authorized requestors who have the access credentials. This paper proposes TRLAC, an a posteriori approach for tracing and revoking leaked …
- 238000000034 method 0 abstract description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Miao et al. | Multi-authority attribute-based keyword search over encrypted cloud data | |
Li et al. | Full verifiability for outsourced decryption in attribute based encryption | |
Ning et al. | CryptCloud $^+ $+: secure and expressive data access control for cloud storage | |
Jung et al. | Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption | |
CN108989026B (en) | A method for revocation of user attributes in publish/subscribe environment | |
Yu et al. | Attribute based data sharing with attribute revocation | |
Yang et al. | Enabling efficient access control with dynamic policy updating for big data in the cloud | |
Sun et al. | Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage | |
Zhou et al. | Privacy-preserved access control for cloud computing | |
Deng et al. | Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data | |
Nasiraee et al. | Privacy-preserving distributed data access control for CloudIoT | |
Xu et al. | A CP-ABE scheme with hidden policy and its application in cloud computing | |
Xiong et al. | A secure re‐encryption scheme for data services in a cloud computing environment | |
Sabitha et al. | Multi-level on-demand access control for flexible data sharing in cloud | |
Cui et al. | Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database | |
Aljafer et al. | A brief overview and an experimental evaluation of data confidentiality measures on the cloud | |
Li et al. | Multi-user searchable encryption with a designated server | |
Park et al. | PKIS: practical keyword index search on cloud datacenter | |
Guo et al. | CD‐ABSE: Attribute‐Based Searchable Encryption Scheme Supporting Cross‐Domain Sharing on Blockchain | |
Zhang et al. | Privacy‐Preserving Attribute‐Based Keyword Search with Traceability and Revocation for Cloud‐Assisted IoT | |
Weng et al. | Efficient Registered Attribute Based Access Control with Same Sub-policies in Mobile Cloud Computing | |
Zhou et al. | Fine‐Grained Attribute‐Based Multikeyword Search for Shared Multiowner in Internet of Things | |
Zhang et al. | A secure enhanced key-policy attribute-based temporary keyword search scheme in the cloud | |
Wang et al. | Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage | |
Wang et al. | Attribute-based encryption with efficient keyword search and user revocation |