Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
KP-ABE
biblio
A Survey on Secured Data Sharing Using Ciphertext Policy Attribute Based Encryption in Cloud
Submitted by grigby1 on Tue, 04/19/2022 - 3:42pm
abe
Cloud Computing
CP-ABE
data privacy
encryption
face recognition
Fingerprint recognition
information management
KP-ABE
policy-based governance
process control
pubcrawl
Scalability
secure data sharing
biblio
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
Submitted by aekwall on Mon, 10/19/2020 - 11:08am
Key Policy Attribute Based Encryption (KP-ABE)
trust
tradition access control
Scalability
Resiliency
public key cryptography
pubcrawl
privacy protection laws
privacy
KP-ABE
key policy attribute-based encryption
Access Control
hierarchical encryption
encryption
edge computing
Data Security
data privacy
cloud computing service
Cloud Computing
basic ABE
authorisation
attribute-based encryption
biblio
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
Submitted by aekwall on Mon, 10/19/2020 - 11:07am
outsourcing
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
secured fine-grained selective access
outsourced cloud data
key-policy attribute-based encryption (KP-ABE)
fine-grain access control system
data users
cloud repositories
data management
IoT environments
fine-grained access control
smart contract
Cloud Computing
Data Transmission
blockchain
pubcrawl
Resiliency
Internet of Things
data privacy
Access Control
encryption
data owners
Cryptography
authorisation
Scalability
biblio
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
Submitted by aekwall on Mon, 10/19/2020 - 11:07am
compromised machine
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
Stephen-Davidowitz
nontrivial combining nonmonotonic formula
nonmonotonic access structure
non-monotonic access structure
multiauthority nonmonotonic KP-ABE scheme
multiauthority key-policy ABE scheme
multiauthority ABE scheme
Multi-authority
MA-KP-ABE-CRF system
ex-filtration
cryptographic reverse firewall concept
cryptographic reverse firewall
CRF security protection
firewalls
Charm library
attribute-based encryption field
attribute-based encryption
formal security analysis
Resists
Firewalls (computing)
pubcrawl
Resiliency
Protocols
secret keys
Access Control
encryption
Cryptography
Scalability
biblio
Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
data privacy
two stage encryption
Servers
security
Scalability
pubcrawl
privacy improvement
policy-based governance
outsourcing
Multi Stage encryption
KP-ABE
key policy-ABE
fine grained access control policy
encryption
Data Security
Access Control
Cryptography
CP-ABE
computer access
collaboration
cloud partial shuffling
cloud data
Cloud Computing
Ciphers
cipher text-ABE
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
authentication
AES
access control model
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
biblio
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
NIST curves
IoT-connected healthcare system
key policy attribute based encryption
Key Policy Attribute Based Encryption (KP-ABE)
key-policy
KP-ABE
Lightweight
lightweight key-policy attribute-based encryption scheme
Logic gates
Internet of Things (IoT)
policy-based governance
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
selective-set model
smart phones
delegation feature
Attribute-based
biomedical communication
Chosen-plaintext attack
ciphertext indistinguishability
collaboration
computer network security
cryptanalysis
decryption key
Android phone
encryption
fixed KP-ABE scheme
H-KP-ABE
health care
hierarchical
hierarchical KP-ABE
Internet of Things
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
key policy attribute based encryption
Vectors
searchable encryption
Scalability
pubcrawl
Probabilistic logic
policy-based governance
optimization
optimisation
KP-ABE-AE scheme
KP-ABE
key-policy attribute-based encryption with attribute extension
key-policy attribute-based encryption
Access Control
Iron
IPE schemes
Identity-based encryption
functional encryption scheme integration
functional encryption
fine-grained access control
encryption
Cryptography
collaboration
authorisation
access policy
access policies
biblio
An efficient KP-ABE scheme for content protection in Information-Centric Networking
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
KP-ABE
fast key generation
FKP-ABE
ICN
indeterminate caches
information-centric networking
internet
Internet traffic
key policy attribute based encryption
fast key decryption
KP-ABE schemes
policy-based governance
pubcrawl
Scalability
self-contained protection
Streaming media
telecommunication traffic
Access Control
fast decryption
encryption
efficient KP-ABE scheme
efficient key-policy ABE
Data Security
Data protection
Cryptography
content protection
computer network security
computer architecture
collaboration
cached contents
cache storage
attribute-based encryption
attribute based encryption
1
2
next ›
last »