ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

Preprint English OPEN
Asghar, Muhammad Rizwan; Ion, Mihaela; Russello, Giovanni; Crispo, Bruno;
(2013)
  • Subject: Computer Science - Cryptography and Security

Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-ho... View more
  • References (36)
    36 references, page 1 of 4

    [1] Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo. ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. In The Sixth International Conference on Availability, Reliability and Security, ARES'11, pages 99-108, August 2011.

    [2] Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo. ESPOONERBAC : Enforcing security policies in outsourced environments. Elsevier Computers & Security (COSE), 35:2-24, 2013. Special Issue of the International Conference on Availability, Reliability and Security (ARES).

    [3] Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo. Poster: ES POONERBAC : Enforcing security policies in outsourced environments with encrypted rbac. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 841- 844, New York, NY, USA, 2011. ACM.

    [4] Mikhail J. Atallah, Marina Blanton, Nelly Fazio, and Keith B. Frikken. Dynamic and e cient key management for access hierarchies. ACM Trans. Inf. Syst. Secur., 12:18:1-18:43, January 2009.

    [5] Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo. Public key encryption with keyword search revisited. In Osvaldo Gervasi, Beniamino Murgante, Antonio Lagan, David Taniar, Youngsong Mun, and Marina Gavrilova, editors, Computational Science and Its Applications ICCSA 2008, volume 5072 of Lecture Notes in Computer Science, pages 1249- 1259. Springer Berlin / Heidelberg, 2008.

    [6] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In Security and Privacy, 2007. SP '07. IEEE Symposium on, pages 321 -334, may 2007.

    [7] Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506- 522. Springer Berlin / Heidelberg, 2004.

    [8] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In Salil Vadhan, editor, Theory of Cryptography, volume 4392 of Lecture Notes in Computer Science, pages 535-554. Springer Berlin / Heidelberg, 2007.

    [9] Robert W. Bradshaw, Jason E. Holt, and Kent E. Seamons. Concealing complex policies with hidden credentials. In Proceedings of the 11th ACM conference on Computer and communications security, CCS '04, pages 146-157, New York, NY, USA, 2004. ACM.

    [10] Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. Searchable symmetric encryption: improved definitions and e cient constructions. In Proceedings of the 13th ACM conference on Computer and communications security, CCS '06, pages 79-88, New York, NY, USA, 2006. ACM.

  • Metrics
Share - Bookmark