{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:42:11Z","timestamp":1725896531243},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319082"},{"type":"electronic","value":"9783642319099"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31909-9_30","type":"book-chapter","created":{"date-parts":[[2012,9,22]],"date-time":"2012-09-22T07:23:23Z","timestamp":1348298603000},"page":"491-500","source":"Crossref","is-referenced-by-count":10,"title":["CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services"],"prefix":"10.1007","author":[{"given":"Huijun","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Cloud Computing, an IDC update (2010), \n                    \n                      http:\/\/www.slideshare.net\/JorFigOr\/cloud-computing-2010-an-idc-update"},{"issue":"5","key":"30_CR2","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/TPDS.2007.70758","volume":"19","author":"Y. Koglin","year":"2008","unstructured":"Koglin, Y., Yao, D., Bertino, E.: Secure Content Distribution by Parallel Processing from Cooperative Intermediaries. IEEE Transactions on Parallel and Distributed Systems\u00a019(5), 615\u2013626 (2008)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Yao, D., Koglin, Y., Bertino, E., Tamassia, R.: Decentralized Authorization and Data Security in Web Content Delivery. In: Proc. ACM Symp. on Applied Computing (SAC), pp. 1654\u20131661 (2007)","DOI":"10.1145\/1244002.1244353"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proceedings of INFOCOM (March 1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"30_CR5","unstructured":"AWS Customer Agreement (2011), \n                    \n                      http:\/\/aws.amazon.com\/agreement\/"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Xiong, H., Zhang, X., Zhu, W., Yao, D.: CloudSeal: End-to-End Content Protection in Cloud-based Storage and Delivery Services. Technical report, Huawei Research (2011)","DOI":"10.1007\/978-3-642-31909-9_30"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get Off of My cloud! Exploring Information Leakage in Third-Party Compute Clouds. In: Proceedings of ACM Conference on Computer and Communications Security (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G. Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Trans. Inf. Syst. Secur.\u00a09, 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45472-1_1","volume-title":"Financial Cryptography","author":"M. Naor","year":"2001","unstructured":"Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 1\u201320. Springer, Heidelberg (2001)"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to Share A Secret. Commun. ACM 22 (November 1979)","DOI":"10.1145\/359168.359176"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Cao, N., Lou, W.: Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing. In: Proceedings of The 31st Int\u2019l Conference on Distributed Computing Systems, ICDCS 2011 (2011)","DOI":"10.1109\/ICDCS.2011.55"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proceedings of INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: Proceedings of INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"30_CR16","series-title":"LNICST","first-page":"59","volume-title":"SecureComm 2011","author":"S. Zarandioon","year":"2012","unstructured":"Zarandioon, S., Yao, D., Ganapathy, V.: K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. In: Rajarajan, M., et al. (eds.) SecureComm 2011. LNICST, vol.\u00a096, pp. 59\u201376. Springer, Heidelberg (2012)"},{"key":"30_CR17","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable Secure File Sharing on Untrusted Storage. In: Proceedings of FAST, Berkeley, CA, USA (2003)"},{"key":"30_CR18","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE\/ACM Trans. Netw. (2000)"},{"key":"30_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-540-46703-8_19","volume-title":"Networked Group Communication","author":"B. Briscoe","year":"1999","unstructured":"Briscoe, B.: MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol.\u00a01736, pp. 301\u2013320. Springer, Heidelberg (1999)"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Briscoe, B.: Nark: Receiver-based Multicast Non-repudiation and Key Management. In: Proceedings of ACM Conference on Electronic Commerce, EC 1999 (1999)","DOI":"10.1145\/336992.336999"},{"key":"30_CR21","unstructured":"Traynor, P., Butler, K.R.B., Enck, W., McDaniel, P.: Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. In: NDSS (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31909-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T13:50:07Z","timestamp":1557237007000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31909-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319082","9783642319099"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31909-9_30","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}