Security governance in multi-cloud environment: a systematic mapping study

H Witti, C Ghedira-Guegan, E Disson… - 2016 IEEE World …, 2016 - ieeexplore.ieee.org
Cloud computing has revolutionized delivery of IT solutions increasing economic
advantages, robustness, scalability, elasticity and security. Nowadays to achieve their cloud …

Efficient authorisation update on cloud data

Z Cui, H Zhu, J Shi, L Chi, K Yan - International Journal of …, 2016 - inderscienceonline.com
To broaden the adoption of cloud computing, it is necessary to provide efficient security
mechanisms for authorisation update, which is a core component of cloud security. In this …

Secure shortest path search over encrypted graph supporting synonym query in cloud computing

H Zhu, B Wu, M Xie, Z Cui, Z Wu - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
As cloud computing become popular, cloud outsourcing service has attracted widespread
attention. Many data owners outsource amounts of graph data to the cloud for cost savings …

Lightweight management of authorization update on cloud data

Z Cui, H Zhu, J Shi, L Chi, K Yan - … international conference on …, 2013 - ieeexplore.ieee.org
While outsourcing data to cloud, security and efficiency issues should be taken into account.
However, it is very challenging to design a secure and efficient mechanism supporting …

Identity‐based key management for cloud computing

H Zhu, Z Mei, M Xie - Security and Communication Networks, 2016 - Wiley Online Library
Recently, cloud computing has drawn much attention from research and industrial
communities. With adoption of cloud computing, data providers can reap huge economic …

基于密钥状态散列树的密钥存储管理方案

王祥宇, 马建峰, 苗银宾, 张凯, 伍祈应 - 通信学报, 2018 - infocomm-journal.com
针对密文检索系统中多源数据加密带来的海量密钥存储管理问题, 提出了以密钥状态散列树作为
密钥派生结构的密钥存储管理方案. 该方案借助根密钥及密钥派生树进行密钥计算 …

Efficient key management for publish/subscribe system in cloud scenarios

Z Cui, G Gao, C Zhou, J Yu… - … Journal of High …, 2016 - inderscienceonline.com
Publish/subscribe system has been well-studied for many applications. However, the key
management of existing methods is not efficient enough. Therefore, we propose an efficient …

A Tripartite Partite Key Generation and Management for Security of Cloud Data Classes

P Dileep Kumar Reddy, CS Bindu… - Proceedings of the …, 2018 - Springer
To enhance security at finer levels class-based cloud data security is studied. Data of high
prioritized class is more confidential and frequently accessed and needed with high security …

Resource division policies for EDF scheduling in ATM networks

AS Ayad, MT El-Hadidi… - Proceedings. Sixth IEEE …, 2001 - ieeexplore.ieee.org
The paper addresses the issue of reserving resources at ATM switches along the path of
calls requiring a deterministic bound to end-to-end delay. The switches are assumed to …

Privacy‐preserving ranked neighbor query over encrypted graph data in the cloud

H Zhu, B Wu, M Xie - Security and Communication Networks, 2016 - Wiley Online Library
As cloud computing becomes prevalent, many data owners outsource their large number of
graph data into the cloud for cost savings. The cloud may not be fully trusted and usually …