Sciweavers

83 search results - page 5 / 17
» Attribute-based encryption for fine-grained access control o...
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 7 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ACSAC
2005
IEEE
14 years 1 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
COORDINATION
2008
Springer
13 years 9 months ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
14 years 9 days ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion
CCS
2006
ACM
13 years 11 months ago
Privacy-preserving semantic interoperation and access control of heterogeneous databases
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalak...