Results 41 to 50 of about 4,231 (188)
PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds [PDF]
Several existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider.
Attia, R +4 more
core +3 more sources
Outsourced attribute-based encryption with policy update
In order to achieve the efficient and flexible access control for the encrypted data stored in the cloud,an outsourced attribute-based encryption scheme with policy update was proposed.Based on the standard attribute-based encryption scheme,the ...
Su-qing LIN
doaj +3 more sources
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end users and/or fog servers
Xiaodan Yan +3 more
doaj +1 more source
Secure secret sharing in the cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core +1 more source
An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing [PDF]
With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE)
Li, Jing +4 more
openaire +2 more sources
Hybrid Publicly Verifiable Computation [PDF]
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate com-putations to more powerful servers, and to verify the correctness of results.
Alderman, James +3 more
core +2 more sources
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things.
Qi Li +6 more
doaj +1 more source
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert +15 more
core +5 more sources
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj +1 more source
Synthetic Strategies for Activity‐Based Probes to Decode Ubiquitin‐Like Modifiers
ABSTRACT Ubiquitin‐like proteins (Ubls) such as SUMO, NEDD8, ISG15, URM1, UFM1, FAT10, ATG8/ATG12, and FUBI are essential regulators of cellular homeostasis, controlling processes from protein stability and trafficking to immune signaling and autophagy.
Saibal Chanda +5 more
wiley +1 more source

