Results 21 to 30 of about 5,378 (199)

Strategies Toward Accessing Enantioenriched (Hetero)Benzo‐Fused 5‐ and 6‐ Membered Rings via Intermolecular Carbometalation

open access: yesAngewandte Chemie, EarlyView.
The use of transition‐metal catalysts and design of chiral ligands have allowed chemists to access highly functionalized benzofused 5‐ and 6‐ membered rings in high yield and enantioselectivity. A common strategy used relies on an intermolecular carbometalation across alkynes and olefins, usually followed by a subsequent intramolecular carbometalation.
Clara Jans   +3 more
wiley   +2 more sources

AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]

open access: yes, 2013
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho   +3 more
core   +1 more source

Attribute-based encryption implies identity-based encryption [PDF]

open access: yes, 2017
In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes.
Herranz Sotoca, Javier
core   +2 more sources

Achieving Flexible and Self-Contained Data Protection in Cloud Computing

open access: yesIEEE Access, 2017
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system servers can no longer be trusted.
Bo Lang, Jinmiao Wang, Yanxi Liu
doaj   +1 more source

Large Universe CP-ABE With Whitebox Traceability

open access: yesInternational Journal on Cybernetics & Informatics, 2016
In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Traceability is the ability of ABE to trace the malicious users or traitors who intentionally leak the partial or modified decryption keys for profits.
Anusha Sivanandhan, Angel M Eldhose
openaire   +1 more source

CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]

open access: yesJisuanji gongcheng, 2020
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj   +1 more source

Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT [PDF]

open access: yes, 2018
Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing and sharing among users.
Belguith, S, Kaaniche, N, Russello, G
core   +3 more sources

Trusted access control mechanism for data with blockchain-assisted attribute encryption

open access: yesHigh-Confidence Computing
In the growing demand for data sharing, how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.
Chang Liu   +5 more
doaj   +1 more source

Constant Ciphertext Length in CP-ABE

open access: yes, 2012
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly ...
Doshi, Nishant, Jinwala, Devesh
openaire   +2 more sources

Benefits of Location-Based Access Control:A Literature Study [PDF]

open access: yes, 2010
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system.
Cleeff, André van   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy