Key management for access control in trusted cloud storages

被引:0
|
作者
机构
[1] [1,Cheng, Fangquan
[2] 1,Peng, Zhiyong
[3] 1,Song, Wei
[4] 1,Wang, Shulin
[5] 1,Cui, Yihui
来源
Song, W. (songwei@whu.edu.cn) | 1613年 / Science Press卷 / 50期
关键词
14;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [2] Cloud Key Management using Trusted Execution Environment
    Bouamama, Jaouhara
    Hedabou, Mustapha
    Erradi, Mohammed
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 560 - 567
  • [3] Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud
    Kumar, Naveen
    Mathuria, Anish
    Das, Manik Lal
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 36 - 44
  • [4] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
  • [5] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [6] Access Control Management for Cloud
    Habiba, Mansura
    Islam, Md. Rafiqul
    Ali, A. B. M. Shawkat
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 485 - 492
  • [7] Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud
    Sarojini, G.
    Vijayakumar, A.
    Selvamani, K.
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 506 - 512
  • [8] Research of key management based on trusted module for cloud storage user
    Zhao, Bo
    Li, Yifan
    Milan, Heinayati
    Fei, Yongkang
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 25 - 31
  • [9] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [10] Key techniques of access control for cloud computing
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Qing, Yu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319