Attribute-based encryption for fine-grained access control of encrypted data (Englisch)
- Neue Suche nach: Goyal, Vipul
- Neue Suche nach: Pandey, Omkant
- Neue Suche nach: Sahai, Amit
- Neue Suche nach: Waters, Brent
- Neue Suche nach: Goyal, Vipul
- Neue Suche nach: Pandey, Omkant
- Neue Suche nach: Sahai, Amit
- Neue Suche nach: Waters, Brent
In:
CCS, ACM Conference on Computer and Communications Security, 13
;
89-98
;
2006
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Attribute-based encryption for fine-grained access control of encrypted data
-
Beteiligte:Goyal, Vipul ( Autor:in ) / Pandey, Omkant ( Autor:in ) / Sahai, Amit ( Autor:in ) / Waters, Brent ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: ACM - Association for Computing Machinery
-
Erscheinungsort:New York
-
Erscheinungsdatum:2006
-
Format / Umfang:10 Seiten, 36 Quellen
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Enforcing Safety and Consistency Constraints in Policy-Based Authorization SystemsLee, A.J. / Winslett, M. / Association for Computing Machinery et al. | 2009
- 1
-
System and Network Trustworthiness in PerspectiveNeumann, P. G. / Association for Computing Machinery et al. | 2006
- 2
-
Data Collection with Self-Enforcing PrivacyGolle, P. / McSherry, F. / Mironov, I. / Association for Computing Machinery et al. | 2009
- 3
-
EXE: Automatically Generating Inputs of DeathCadar, C. / Ganesh, V. / Pawlowski, P.M. / Dill, D.L. / Engler, D.R. / Association for Computing Machinery et al. | 2009
- 4
-
Fast and Black-box Exploit Detection and Signature Generation for Commodity SoftwareWang, X. / Li, Z. / Choi, J.Y. / Xu, J. / Reiter, M.K. / Kil, C. / Association for Computing Machinery et al. | 2009
- 5
-
Puppetnets: Misusing Web Browsers as a Distributed Attack InfrastructureAntonatos, S. / Akritidis, P. / Lam, V.T. / Anagnostakis, K.G. / Association for Computing Machinery et al. | 2009
- 6
-
Thwarting E-mail Spam LaunderingXie, M. / Yin, H. / Wang, H. / Association for Computing Machinery et al. | 2009
- 6
-
Providing Witness Anonymity in Peer-to-Peer SystemsZhu, B. / Setia, S. / Jajodia, S. / Association for Computing Machinery et al. | 2006
- 17
-
Salsa: A Structured Approach to Large-Scale AnonymityNambiar, A. / Wright, M. / Association for Computing Machinery et al. | 2006
- 27
-
Hot or Not: Revealing Hidden Services by Their Clock SkewMurdoch, S. J. / Association for Computing Machinery et al. | 2006
- 37
-
Packet Vaccine: Black-box Exploit Detection and Signature GenerationWang, X. F. / Li, Z. / Xu, J. / Reiter, M. K. / Kil, C. / Choi, J. Y. / Association for Computing Machinery et al. | 2006
- 47
-
Protomatching Network Traffic for High Throughput Network Intrusion DetectionRubin, S. / Jha, S. J. / Miller, B. P. / Association for Computing Machinery et al. | 2006
- 59
-
Evading Network Anomaly Detection Systems: Formal Reasoning and Practical TechniquesFogla, P. / Lee, W. / Association for Computing Machinery et al. | 2006
- 79
-
Searchable Symmetric Encryption: Improved Definitions and Efficient ConstructionsCurtmola, R. / Garay, J. / Kamara, S. / Ostrovsky, R. / Association for Computing Machinery et al. | 2006
- 89
-
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted DataGoyal, V. / Pandey, O. / Sahai, A. / Waters, B. P. / Association for Computing Machinery et al. | 2006
- 99
-
Secure Attribute-Based SystemsPirretti, M. / Traynor, P. / McDaniel, P. / Waters, B. / Association for Computing Machinery et al. | 2006
- 113
-
Resiliency Policies in Access ControlLi, N. / Tripunitara, M. V. / Wang, Q. / Association for Computing Machinery et al. | 2006
- 124
-
Safety and Consistency in Policy-Based Authorization SystemsLee, A. J. / Winslett, M. / Association for Computing Machinery et al. | 2006
- 134
-
On the Modeling and Analysis of ObligationsIrwin, K. / Yu, T. / Winsborough, W. H. / Association for Computing Machinery et al. | 2006
- 144
-
RoleMiner: Mining Role using Subset EnumerationVaidya, J. / Atluri, V. / Warner, J. / Association for Computing Machinery et al. | 2006
- 154
-
Doppelganger: Better Browser Privacy Without the BotherShankar, U. / Karlof, C. / Association for Computing Machinery et al. | 2006
- 168
-
Fourth-Factor Authentication: Somebody You KnowBrainard, J. / Juels, A. / Rivest, R. L. / Szydlo, M. / Yung, M. / Association for Computing Machinery et al. | 2006
- 179
-
An Effective Defense Against Email Spam LaunderingXie, M. / Yin, H. / Wang, H. / Association for Computing Machinery et al. | 2006
- 191
-
Forward-Secure Signatures with Untrusted UpdateBoyen, X. / Shacham, H. / Shen, E. / Waters, B. / Association for Computing Machinery et al. | 2006
- 201
-
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous AuthenticationCamenisch, J. / Hohenberger, S. / Kohlweiss, M. / Lysyanskaya, A. / Meyerovich, M. / Association for Computing Machinery et al. | 2006
- 211
-
A Fully Collusion Resistant Broadcast, Trace, and Revoke SystemBoneh, D. / Waters, B. / Association for Computing Machinery et al. | 2006
- 235
-
A Natural Language Approach to Automated Cryptanalysis of Two-Time PadsMason, J. / Waters, K. / Eisner, J. / Stubblefield, A. / Association for Computing Machinery et al. | 2006
- 245
-
Dictionary Attacks Using Keyboard Acoustic EmanationsBerger, Y. / Wool, A. / Yeredor, A. / Association for Computing Machinery et al. | 2006
- 255
-
Inferring the Source of Encrypted HTTP ConnectionsLiberatore, M. / Levine, B. N. / Association for Computing Machinery et al. | 2006
- 264
-
TinySeRSync: Secure & Resilient Time Synchronization in Wireless Sensor NetworksSun, K. / Ning, P. / Wang, C. / Liu, A. / Zhou, Y. / Association for Computing Machinery et al. | 2006
- 264
-
TinySeRSync: Secure and resilient time synchronization in wireless sensor networksSun, Kun / Ning, Peng / Wang, Cliff / Liu, An / Zhou, Yuzheng et al. | 2006
- 278
-
Secure Hierarchical In-Network Aggregation in Sensor NetworksChen, H. / Perrig, A. / Song, D. / Association for Computing Machinery et al. | 2006
- 288
-
Provably-Secure Time-Bound Hierarchical Key Assignment SchemesAteniese, G. / De Santis, A. / Ferrara, A. L. / Masucci, B. / Association for Computing Machinery et al. | 2006
- 298
-
Optimizing BGP Security by Exploiting Path StabilityButler, K. / McDaniel, P. / Aiello, W. / Association for Computing Machinery et al. | 2006
- 311
-
Replayer: Automatic Protocol Replay by Binary AnalysisNewsome, J. / Brumley, D. / Franklin, J. / Song, D. / Association for Computing Machinery et al. | 2006
- 336
-
A Scalable Approach to Attack Graph GenerationOu, X. / Boyer, W. F. / McQueen, M. A. / Association for Computing Machinery et al. | 2006
- 346
-
Formal Specification and Verification of Data Separation in a Separation Kernel for an Embedded SystemHeitmeyer, C. L. / Archer, M. / Leonard, E. I. / McLean, J. / Association for Computing Machinery et al. | 2006
- 356
-
Beyond Separation of Duty: An Algebra for Specifying High-level Security PoliciesLi, N. / Wang, Q. / Association for Computing Machinery et al. | 2006
- 370
-
Computationally Sound Secrecy Proofs by Mechanized Flow AnalysisBackes, M. / Laud, P. / Association for Computing Machinery et al. | 2006
- 380
-
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit ExponentiationBellare, M. / Kohno, T. / Shoup, V. / Association for Computing Machinery et al. | 2006
- 390
-
Multi-Signatures in the Plain Public-Key Model and a General Forking LemmaBellare, M. / Neven, G. / Association for Computing Machinery et al. | 2006
- 400
-
Deniable Authentication and Key ExchangeDi Raimondo, M. / Gennaro, R. / Krawczyk, H. / Association for Computing Machinery et al. | 2006
- 410
-
Secure Function Evaluation with Ordered Binary Decision DiagramsKruger, L. / Jha, S. / Goh, E.-J. / Boneh, D. / Association for Computing Machinery et al. | 2006