2018
DOI: 10.1007/978-981-13-2035-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…A solution that uses role-and attribute-based access control for data exchange among services, including services hosted by untrusted environments is presented in [80] for privacy-preserving data exchange, data leakage detection, and prevention. The methodology employs Active Bundles (AB) that contain key-value pairs with values in encrypted form; metadata; access control policies and a policy enforcement engine.…”
Section: Figure 6: Key Components Of Watermarking Based Modelsmentioning
confidence: 99%
“…A solution that uses role-and attribute-based access control for data exchange among services, including services hosted by untrusted environments is presented in [80] for privacy-preserving data exchange, data leakage detection, and prevention. The methodology employs Active Bundles (AB) that contain key-value pairs with values in encrypted form; metadata; access control policies and a policy enforcement engine.…”
Section: Figure 6: Key Components Of Watermarking Based Modelsmentioning
confidence: 99%