{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:40:09Z","timestamp":1746340809841,"version":"3.40.4"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112022"},{"type":"electronic","value":"9783319112039"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11203-9_21","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T20:36:46Z","timestamp":1408048606000},"page":"362-379","source":"Crossref","is-referenced-by-count":22,"title":["Who Is Touching My Cloud"],"prefix":"10.1007","author":[{"given":"Hua","family":"Deng","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-642-38980-1_27","volume-title":"Applied Cryptography and Network Security","author":"N. Asokan","year":"2013","unstructured":"Asokan, N., Dmitrienko, A., Nagy, M., Reshetova, E., Sadeghi, A.-R., Schneider, T., Stelle, S.: CrowdShare: Secure mobile resource sharing. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol.\u00a07954, pp. 432\u2013440. Springer, Heidelberg (2013)"},{"key":"21_CR2","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)"},{"key":"21_CR3","first-page":"501","volume-title":"ACM CCS 2008","author":"D. Boneh","year":"2008","unstructured":"Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: ACM CCS 2008, pp. 501\u2013510. ACM Press, New York (2008)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11761679_34","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"D. Boneh","year":"2006","unstructured":"Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 573\u2013592. Springer, Heidelberg (2006)"},{"key":"21_CR5","first-page":"211","volume-title":"ACM CCS 2006","author":"D. Boneh","year":"2006","unstructured":"Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: ACM CCS 2006, pp. 211\u2013220. ACM Press, New York (2006)"},{"key":"21_CR6","first-page":"425","volume-title":"ASIACCS 2014","author":"H. Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: ASIACCS 2014, pp. 425\u2013434. ACM Press, New York (2014)"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H. Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Information Sciences\u00a0275, 370\u2013384 (2014)","journal-title":"Information Sciences"},{"key":"21_CR8","first-page":"121","volume-title":"ACM CCS 2010","author":"S. Garg","year":"2010","unstructured":"Garg, S., Kumarasubramanian, A., Sahai, A., Waters, B.: Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: ACM CCS 2010, pp. 121\u2013130. ACM Press, New York (2010)"},{"key":"21_CR9","first-page":"89","volume-title":"ACM CCS 2006","author":"V. Goyal","year":"2006","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted Data. In: ACM CCS 2006, pp. 89\u201398. ACM Press, New York (2006)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobile cloud computing. In: IEEE Conferenc on Computer Communications Workshops, pp. 614\u2013618. IEEE (2011)","DOI":"10.1109\/INFCOMW.2011.5928886"},{"key":"21_CR11","first-page":"18","volume-title":"ASIACCS 2012","author":"J. Lai","year":"2012","unstructured":"Lai, J., Deng, R.H., Li, Y.: Expressive cp-abe with partially hidden access structures. In: ASIACCS 2012, pp. 18\u201319. ACM Press, New York (2012)"},{"key":"21_CR12","first-page":"386","volume-title":"ASIACCS 2011","author":"J. Li","year":"2011","unstructured":"Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: ASIACCS 2011, pp. 386\u2013390. ACM Press, New York (2011)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Li, F., Rahulamathavan, Y., Rajarajan, M., Phan, R.C.W.: Low complexity multi-authority attribute based encryption scheme for mobile cloud computing. In: IEEE 7th International Symposium on Service Oriented System Engineering, pp. 573\u2013577. IEEE (2013)","DOI":"10.1109\/SOSE.2013.12"},{"key":"21_CR14","unstructured":"Li, J., Ren, K., Kim, K.: A2BE: accountable attribute-based encryption for abuse free access control. IACR Cryptology ePrint Archive, Report 2009\/118 (2009), http:\/\/eprint.iacr.org\/"},{"key":"21_CR15","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-3-319-11212-1_6","volume-title":"ESORICS 2014","author":"W. Liu","year":"2014","unstructured":"Liu, W., Liu, J., Wu, Q., Qin, B., Zhou, Y.: Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol.\u00a08713, pp. 91\u2013108. Springer, Heidelberg (2014)"},{"issue":"1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","volume":"8","author":"Z. Liu","year":"2013","unstructured":"Liu, Z., Cao, Z.F., Wong, D.S.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Transaction on Informaction Forensics and Security\u00a08(1), 76\u201388 (2013)","journal-title":"IEEE Transaction on Informaction Forensics and Security"},{"key":"21_CR17","unstructured":"Liu, Z., Cao, Z.F., Wong, D.S.: Expressive black-box traceable ciphertext-policy attribute-based encryption. IACR Cryptology ePrint Archive, Report 2012\/669 (2012), http:\/\/eprint.iacr.org\/"},{"key":"21_CR18","first-page":"475","volume-title":"ACM CCS 2013","author":"Z. Liu","year":"2013","unstructured":"Liu, Z., Cao, Z.F., Wong, D.S.: Blackbox traceable cp-abe: how to catch people leaking their keys by selling decryption devices on eBay. In: ACM CCS 2013, pp. 475\u2013486. ACM Press, New York (2013)"},{"issue":"3","key":"21_CR19","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s10623-009-9285-z","volume":"52","author":"K. Nuida","year":"2009","unstructured":"Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H., Ogawa, K., Imai, H.: An improvement of discrete tardos fingerprinting codes. Designs, Codes and Cryptography\u00a052(3), 339\u2013362 (2009)","journal-title":"Designs, Codes and Cryptography"},{"issue":"4","key":"21_CR20","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s10586-013-0258-7","volume":"16","author":"B. Qin","year":"2013","unstructured":"Qin, B., Wang, H., Wu, Q., Liu, J., Domingo-Ferrer, D.: Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Computing\u00a016(4), 845\u2013859 (2013)","journal-title":"Cluster Computing"},{"issue":"2","key":"21_CR21","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2013.46","volume":"46","author":"M. Singhal","year":"2013","unstructured":"Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in multicloud computing environments: framework and security issues. IEEE Computer\u00a046(2), 76\u201384 (2013)","journal-title":"IEEE Computer"},{"key":"21_CR22","first-page":"116","volume-title":"STOC 2003","author":"G. Tardos","year":"2003","unstructured":"Tardos, G.: Optimal Probabilistic Fingerprint Codes. In: STOC 2003, pp. 116\u2013125. ACM Press, New York (2003)"},{"key":"21_CR23","series-title":"LNCS","first-page":"323","volume-title":"ESORICS 2014","author":"Y. Wang","year":"2014","unstructured":"Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S.M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol.\u00a08712, pp. 323\u2013340. Springer, Heidelberg (2014)"},{"key":"21_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B. Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol.\u00a06571, pp. 53\u201370. Springer, Heidelberg (2011)"},{"issue":"1","key":"21_CR25","first-page":"181","volume":"27","author":"Y.T. Wang","year":"2011","unstructured":"Wang, Y.T., Chen, K.F., Chen, J.H.: Attribute-based traitor tracing. J. Inf. Sci. Eng.\u00a027(1), 181\u2013195 (2011)","journal-title":"J. Inf. Sci. Eng."},{"key":"21_CR26","unstructured":"Wu, Y., Deng, R.H.: On the security of fully collusion resistant taitor tracing schemes. IACR Cryptology ePrint Archive, Report 2008\/450 (2008), http:\/\/eprint.iacr.org\/"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Yang, Y., Jia, X.: Attributed-based access control for multi-authority systems in cloud storage. In: IEEE 32nd International Conference on Distributed Computing Systems, pp. 536\u2013545. IEEE (2012)","DOI":"10.1109\/ICDCS.2012.42"},{"key":"21_CR28","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-05284-2_18","volume-title":"Security and Privacy in Communication Networks","author":"S. Yu","year":"2009","unstructured":"Yu, S., Ren, K., Lou, W., Li, J.: Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol.\u00a019, pp. 311\u2013329. Springer, Heidelberg (2009)"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of IEEE INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462174"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2014"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11203-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:07:15Z","timestamp":1746338835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11203-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112022","9783319112039"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11203-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}