Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2023
Secure access privilege delegation using attribute-based encryption
International Journal of Information Security (IJOIS), Volume 22, Issue 5Pages 1261–1276https://doi.org/10.1007/s10207-023-00690-2AbstractAttribute-based encryption (ABE) is widely used for a secure and efficient data sharing. The predetermined access policy of ABE shares the data with intended data users. However, ABE is not preferable in many applications that require ...
- research-articleNovember 2021
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud
ACM Transactions on Privacy and Security (TOPS), Volume 25, Issue 1Article No.: 2, Pages 1–37https://doi.org/10.1145/3474056To facilitate the adoption of cloud by organizations, Cryptographic Access Control (CAC) is the obvious solution to control data sharing among users while preventing partially trusted Cloud Service Providers (CSP) from accessing sensitive data. Indeed, ...
- research-articleFebruary 2020
Flexible attribute-based proxy re-encryption for efficient data sharing
Information Sciences: an International Journal (ISCI), Volume 511, Issue CPages 94–113https://doi.org/10.1016/j.ins.2019.09.052AbstractAn increasing number of people are sharing their data through third-party platforms. Attribute-based encryption (ABE) is a promising primitive that allows enforcing fine-grained access control on the data to be shared. An issue in ABE ...
- research-articleOctober 2015
Parallel search over encrypted data under attribute based encryption on the Cloud Computing
Computers and Security (CSEC), Volume 54, Issue CPages 77–91https://doi.org/10.1016/j.cose.2015.04.007Data confidentiality in the Cloud Computing is a very challenging task. Encryption is one of the most secure methods ensuring this task, and searchable encryption techniques are used to search on encrypted data without the need for decryption. But, ...