Proceedings of the 14th International Joint Conference on E-Business and Telecommunications 2017
DOI: 10.5220/0006461604950500
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analyze of a Private Access Control Protocol to a Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…-Security properties: They often aim to guarantee data's confidentiality and users' privacy for Cloud and Fog systems [Zeng, 2016] [Berrima, 2017] [Zahra, 2017] [Puthal, 2018] [Ouchani, 2018] [Bouheroum, 2019.…”
Section: Formal Verification Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…-Security properties: They often aim to guarantee data's confidentiality and users' privacy for Cloud and Fog systems [Zeng, 2016] [Berrima, 2017] [Zahra, 2017] [Puthal, 2018] [Ouchani, 2018] [Bouheroum, 2019.…”
Section: Formal Verification Approachesmentioning
confidence: 99%
“…Model checking Theorem proving [Du, 2017] [Kumari, 2017] [Huang, 2016] [Shah-Mansouri, 2018] [Mohamed, 2015] [Jung, 2015] [BenHalima, 2016] [Zeng, 2016] [Berrima, 2017] [Keshanchi, 2017] [BenHalima, 2018] [Puthal, 2018] [Zahra, 2017] [Kochovski, 2019] [Toor, 2019] [Cheikhrouhou, 2019] [Etchevers, 2017] [Sahli, 2017] [Ouchani, 2018] [Khebbeb, 2020a] [Moudjari, 2018] [Khebbeb, 2018] [Bouanaka, 2018] [Kochovski, 2019] [Zitouni, 2019] [Bouanaka, 2019] [Latreche, 2019] [Bouheroum, 2019] [Khebbeb, 2020a] [Khebbeb, 2020b] [Fakhfakh, 2018] [Lahouij, 2018] [Boubaker, 2016 Table 1: Taxonomy of the formal verification approaches -Mobility properties: They aim at providing and keeping resources close to where the data is generated [Khebbeb, 2020b].…”
Section: Formal Verification Approaches Handwrittenmentioning
confidence: 99%
“…A preliminary version of this paper appeared in (Berrima et al, 2017). Outline: In Section 2, we give a description of SSH protocol, ABS and ABE schemes and RSN'12 protocol.…”
Section: Introductionmentioning
confidence: 99%