- M. Nabeel and E. Bertino, “Privacy preserving delegated access control in public cloud,” in IEEE Transactions on Knowledge and DataEngineering, 2014.
- M. Nabeel and E. Bertino, “Privacy preserving delegated access control in the storage as a service model” in IEEE International Conference onInformation Reuse and Integration (IRI), 2012.
- M. Nabeel and E. Bertino, “Privacy preserving policy based content sharing in public clouds,“In IEEE Transactions on Knowledge and DataEngineering, 2012.
- M. Nabeel, E. Bertino, M. Kantarcioglu, and B. M. Thuraisingham, “Towards privacy preserving access control in the cloud,” in Proceedings ofthe 7th International Conference on Collaborative Computing: Networking, Applications and Work sharing, ser. Collaborate Com ’11, 2011,pp. 172–180.
- M. Nabeel and E. Bertino, “Towards attribute based group key management,” in Proceedings of the 18th ACM conference on Computer andcommunications security, Chicago, Illinois, USA, 2011.
- NesrineKaaniche, Maryline Laurent,” A Secure Client Side Deduplication Scheme in Cloud Storage Environments” 6th InternationalConference on new Technologies, Mobility and Security year 2014.
- D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side channels in cloud services: Deduplication in cloud storage. IEEE Security And Privacy,8(6):40–47, 2010.
- A.Fiat and M. Naor, “Broadcast Encryption,” Proc. 13th Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO ’93), pp. 480-491,1994.
- D. Hankerson, A. J. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus, NJ, USA,2003.
- Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attri-bute-Based Encryption,” Proc. IEEE Symp. Security and Privacy (SP ’07), pp.321-334, 2007.
- E. Bertino and E. Ferrari, “Secure and Selective Dissemination of XML Documents,” ACM Trans. Information and System Security, vol. 5, no.3, pp. 290-321, 2002.
- J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious Trans-fer with Access Control,” Proc. 16th ACM Conf. Computer and Comm.Security (CCS ’09), pp. 131-140, 2009.
- Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. 13thACM Conf. Computer and Comm. Security (CCS ’06), PP 89-98, 2006.
- J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8thACM SIGSAC symposium on Information, computer and communications security, ASIA CCS ’13, pages 195–206, New York, NY, USA,2013. ACM.
- R. C. Merkle. A digital signature based on a conventional encryption function. In A Conference on the Theory and Applications ofCryptographic Techniques on Advances in Cryptology, CRYPTO ’87, pages 369–378, London, UK, UK, 1988. Springer-Verlag.
- R. C. Merkle. A digital signature based on a conventional encryption function. In A Conference on the Theory and Applications ofCryptographic Techniques on Advances in Cryptology, CRYPTO ’87, pages 369–378, London, UK, UK, 1988. Springer-Verlag.
- SmithaSundareswaran, Anna C. Squicciarini, Member, IEEE, and Dan Lin, “Ensuring Distributed Accountability for Data Sharing in theCloud” March 2012.
- Junzuo Lai, Robert H. Deng, Chaowen Guan, and JianWeng “Attribute- Based Encryption with Verifiable Outsourced Decryption” 2013.
|