{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:08:18Z","timestamp":1725455298220},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/icdim.2012.6360134","type":"proceedings-article","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T21:16:48Z","timestamp":1354310208000},"page":"239-244","source":"Crossref","is-referenced-by-count":8,"title":["Achieving privacy and security in multi-owner data outsourcing"],"prefix":"10.1109","author":[{"given":"Somchart","family":"Fugkeaw","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/1102120.1102147","article-title":"Dynamic and efficient key management for access hierarchies","author":"atallah","year":"2005","journal-title":"Proc ACM Conference on Computer and Communications Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314477"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133633"},{"key":"1","article-title":"Encryption Policies for Regulating Access to Outsourced Data","author":"de capitani di vimercati","year":"2010","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"7","article-title":"Securing Personaly Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings","author":"li","year":"0","journal-title":"Proceedings of SecureComm Singapore 2010"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"5","article-title":"K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access","author":"zarandioon","year":"0","journal-title":"IEEE INFOCOM 2011 London UK September 2011"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"9","first-page":"390","article-title":"Multi-signatures in the plain publickeymodel and a general forking lemma","author":"bellare","year":"2006","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_17"}],"event":{"name":"2012 Seventh International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2012,8,22]]},"location":"Macau, Macao","end":{"date-parts":[[2012,8,24]]}},"container-title":["Seventh International Conference on Digital Information Management (ICDIM 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6341280\/6360086\/06360134.pdf?arnumber=6360134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:23:23Z","timestamp":1498001003000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6360134\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icdim.2012.6360134","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}