{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:48:57Z","timestamp":1725796137118},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439357"},{"type":"electronic","value":"9783662439364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_21","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T12:05:04Z","timestamp":1403870704000},"page":"324-338","source":"Crossref","is-referenced-by-count":1,"title":["Towards Secure Cloud Database with Fine-Grained Access Control"],"prefix":"10.1007","author":[{"given":"Michael G.","family":"Solomon","sequence":"first","affiliation":[]},{"given":"Vaidy","family":"Sunderam","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE Computer Society (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Carroll, M., van der Merwe, A., Kotze, P.: Secure cloud computing: Benefits, risks and controls. In: Information Security South Africa (ISSA), pp. 1\u20139 (August 2011)","DOI":"10.1109\/ISSA.2011.6027519"},{"key":"21_CR4","first-page":"121","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"M. Chase","year":"2009","unstructured":"Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 121\u2013130. ACM, New York (2009)"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1655008.1655020","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009","author":"R. Chow","year":"2009","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: Outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 85\u201390. ACM, New York (2009)"},{"key":"21_CR6","unstructured":"Transaction Processing\u00a0Performance Council. Tpc benchmark c, standard specification version 5 (2001)"},{"key":"21_CR7","unstructured":"Deshmukh, Pasha A., Qureshi, et al.: Transparent data encryption\u2013solution for security of database contents. arXiv preprint arXiv:1303.0418 (2013)"},{"key":"21_CR8","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007, pp. 123\u2013134. VLDB Endowment (2007)"},{"key":"21_CR9","unstructured":"Elmasri, R.A., Navathe, S.B.: Fundamentals of Database Systems [With Access Code]. Addison Wesley Publishing Company Incorporated (2011)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Farcasescu, M.R.: Trust model engines in cloud computing. In: 2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 465\u2013470 (September 2012)","DOI":"10.1109\/SYNASC.2012.57"},{"key":"21_CR11","unstructured":"Ferretti, L., Colajanni, M., Marchetti, M., Scaruffi, A.E.: Transparent access on encrypted data distributed over multiple cloud infrastructures. In: The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING 2013, pp. 201\u2013207 (2013)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 480\u2013491. Springer, Heidelberg (1994)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Gowrigolla, B., Sivaji, S., Masillamani, M.R.: Design and auditing of cloud computing security. In: 2010 5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 292\u2013297 (December 2010)","DOI":"10.1109\/ICIAFS.2010.5715676"},{"key":"21_CR14","first-page":"89","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006","author":"V. Goyal","year":"2006","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89\u201398. ACM, New York (2006)"},{"key":"21_CR15","unstructured":"Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Univeristy of Twente, Tech. Rep. (2009)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Jansen, W., Grance, T., et al.: Guidelines on security and privacy in public cloud computing. NIST Special Publication\u00a0800:144 (2011)","DOI":"10.6028\/NIST.SP.800-144"},{"issue":"5","key":"21_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"K.M. Khan","year":"2010","unstructured":"Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Professional\u00a012(5), 20\u201327 (2010)","journal-title":"IT Professional"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-319-04873-4_4","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2013","author":"J. Kim","year":"2014","unstructured":"Kim, J., Susilo, W., Au, M.H., Seberry, J.: Efficient semi-static secure broadcast encryption scheme. In: Cao, Z., Zhang, F. (eds.) Pairing 2013. LNCS, vol.\u00a08365, pp. 62\u201376. Springer, Heidelberg (2014)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Kulkarni, G., Chavan, N., Chandorkar, R., Waghmare, R., Palwe, R.: Cloud security challenges. In: 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp. 88\u201391 (October 2012)","DOI":"10.1109\/TSSA.2012.6366028"},{"issue":"1","key":"21_CR20","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TITB.2007.906101","volume":"12","author":"W.-B. Lee","year":"2008","unstructured":"Lee, W.-B., Lee, C.-D.: A cryptographic key management solution for hipaa privacy\/security regulations. IEEE Transactions on Information Technology in Biomedicine\u00a012(1), 34\u201341 (2008)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"1","key":"21_CR21","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M. Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems\u00a024(1), 131\u2013143 (2013)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"21_CR22","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. Theory in practice. O\u2019Reilly Media (2009)"},{"issue":"4","key":"21_CR23","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10207-013-0190-0","volume":"12","author":"D.-H. Phan","year":"2013","unstructured":"Phan, D.-H., Pointcheval, D., Shahandashti, S.F., Strefler, M.: Adaptive cca broadcast encryption with constant-size secret keys and ciphertexts. International Journal of Information Security\u00a012(4), 251\u2013265 (2013)","journal-title":"International Journal of Information Security"},{"key":"21_CR24","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2043556.2043566","volume-title":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011","author":"R.A. Popa","year":"2011","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011, pp. 85\u2013100. ACM, New York (2011)"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Shen, Z., Tong, Q.: The security of cloud computing system enabled by trusted computing technology. In: 2010 2nd International Conference on Signal Processing Systems (ICSPS), vol.\u00a02, pp. V2\u201311\u2013V2\u201315 (July 2010)","DOI":"10.1109\/ICSPS.2010.5555234"},{"issue":"5","key":"21_CR26","doi-asserted-by":"crossref","first-page":"289","DOI":"10.14778\/2535573.2488336","volume":"6","author":"S. Tu","year":"2013","unstructured":"Tu, S., Frans Kaashoek, M., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. Proc. VLDB Endow.\u00a06(5), 289\u2013300 (2013)","journal-title":"Proc. VLDB Endow."},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139 (March 2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"21_CR28","first-page":"261","volume-title":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010","author":"S. Yu","year":"2010","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 261\u2013270. ACM, New York (2010)"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. Cryptology ePrint Archive, Report 2013\/462 (2013), http:\/\/eprint.iacr.org\/","DOI":"10.1109\/INFOCOM.2014.6847976"},{"issue":"10","key":"21_CR30","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1093\/comjnl\/bxr080","volume":"54","author":"L. Zhou","year":"2011","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing role-based access control for secure data storage in the cloud. The Computer Journal\u00a054(10), 1675\u20131687 (2011)","journal-title":"The Computer Journal"},{"key":"21_CR31","first-page":"753","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010","author":"Z. Zhou","year":"2010","unstructured":"Zhou, Z., Huang, D.: On efficient ciphertext-policy attribute based encryption and broadcast encryption: Extended abstract. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 753\u2013755. ACM, New York (2010)"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Zou, X., Dai, Y.-S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: The 27th Conference on Computer Communications, INFOCOM 2008., pp. 538\u2013546. IEEE (April 2008)","DOI":"10.1109\/INFOCOM.2007.102"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T12:15:36Z","timestamp":1649506536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}