DOI: 10.3990/1.9789036532280
|View full text |Cite
|
Sign up to set email alerts
|

Ctyptographically enforced distributed data access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 97 publications
(177 reference statements)
0
2
0
Order By: Relevance
“…However, this solution requires a high degree of participation by the cloud provider or third party, and the work does not address the high cost of such operations as deleting users (which can incur cascading updates). Ibraimi's thesis [41] proposes methods for outsourcing data storage using asymmetric encryption. However, the proposed method for supporting revocation requires a trusted mediator and keyshare escrow to verify all reads against a revocation list (and does not address revoked users reusing cached keyshares).…”
Section: Cryptographic Access Controlsmentioning
confidence: 99%
“…However, this solution requires a high degree of participation by the cloud provider or third party, and the work does not address the high cost of such operations as deleting users (which can incur cascading updates). Ibraimi's thesis [41] proposes methods for outsourcing data storage using asymmetric encryption. However, the proposed method for supporting revocation requires a trusted mediator and keyshare escrow to verify all reads against a revocation list (and does not address revoked users reusing cached keyshares).…”
Section: Cryptographic Access Controlsmentioning
confidence: 99%
“…However, they are often neglected in the existing research on cryptographic access control. There have been some initial works in this area that focus on new primitives motivated by access control systems [7,2,13] and on access control systems based on said primitives [9,12,14,6].…”
Section: Introductionmentioning
confidence: 99%