Results 41 to 50 of about 4,231 (188)

PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds [PDF]

open access: yes, 2016
Several existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider.
Attia, R   +4 more
core   +3 more sources

Outsourced attribute-based encryption with policy update

open access: yes网络与信息安全学报, 2016
In order to achieve the efficient and flexible access control for the encrypted data stored in the cloud,an outsourced attribute-based encryption scheme with policy update was proposed.Based on the standard attribute-based encryption scheme,the ...
Su-qing LIN
doaj   +3 more sources

Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices

open access: yesApplied Sciences, 2023
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end users and/or fog servers
Xiaodan Yan   +3 more
doaj   +1 more source

Secure secret sharing in the cloud [PDF]

open access: yes, 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing [PDF]

open access: yes2017 IEEE International Conference on Communications (ICC), 2017
With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE)
Li, Jing   +4 more
openaire   +2 more sources

Hybrid Publicly Verifiable Computation [PDF]

open access: yes, 2016
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate com-putations to more powerful servers, and to verify the correctness of results.
Alderman, James   +3 more
core   +2 more sources

Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT

open access: yesDigital Communications and Networks
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things.
Qi Li   +6 more
doaj   +1 more source

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

open access: yesIEEE Access, 2017
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj   +1 more source

Synthetic Strategies for Activity‐Based Probes to Decode Ubiquitin‐Like Modifiers

open access: yesChemistry – A European Journal, EarlyView.
ABSTRACT Ubiquitin‐like proteins (Ubls) such as SUMO, NEDD8, ISG15, URM1, UFM1, FAT10, ATG8/ATG12, and FUBI are essential regulators of cellular homeostasis, controlling processes from protein stability and trafficking to immune signaling and autophagy.
Saibal Chanda   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy