CK Chu, SSM Chow, WG Tzeng… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Data sharing is an important functionality in cloud storage. In this paper, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered classes (represented as a directed graph). A user with …
C Guo, N Luo, MZA Bhuiyan, Y Jie, Y Chen… - Future Generation …, 2018 - Elsevier
Sharing encrypted data with different users via public cloud storage is an important functionality. Therefore, we propose a key-aggregate authentication cryptosystem that can …
MH Park, YH Park, HY Jeong… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
With the emergence of diverse group-based services, multiple multicast groups are likely to coexist in a single network, and users may subscribe to multiple groups simultaneously …
K Alimohammadi, M Bayat, HHS Javadi - Multimedia Tools and …, 2020 - Springer
The ability of data owner in secure and efficient arbitrary data sharing with others is of great importance in the outsourced encrypted data on the cloud. To protect data confidentiality …
N Xi, J Liu, Y Li, B Qin - ISA transactions, 2023 - Elsevier
With the rapid advancement of cloud-native computing, the microservice with high concurrency and low coupling has ushered in an unprecedented period of vigorous …
P Sakarindr, N Ansari - IET information security, 2010 - IET
Secure group communication (SGC) has attracted much attention, as group-oriented communications have been increasingly facilitating many emerging applications that require …
A Kiran, S Dharanikota, A Basava - TENCON 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
The keystone of information security has been access control. Very often, User data is misused and users are oblivious to the use of their data by unauthorized parties. Current …