{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:27:48Z","timestamp":1729650468551,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856693","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"182-187","source":"Crossref","is-referenced-by-count":7,"title":["Sharing in the rain: Secure and efficient data sharing for the Cloud"],"prefix":"10.1109","author":[{"given":"Antonis","family":"Michalas","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2015.108"},{"key":"ref11","article-title":"A report on design and implementation of protected searchable data in iaas","author":"dowsley","year":"2016","journal-title":"Technical Report Swedish Institute of Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848142"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-642-32009-5_13","article-title":"Dynamic credentials and ciphertext delegation for attribute-based encryption","author":"sahai","year":"2012","journal-title":"Proceedings of the 32nd Annual International Cryptology Conference Advances in Cryptology-CRYPTO2012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689528"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2011010102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940931"},{"key":"ref18","first-page":"79","article-title":"Cryptographic puzzles and game theory against dos and ddos attacks in networks","volume":"19","author":"michalas","year":"2012","journal-title":"International Journal of Computer Research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208686"},{"key":"ref4","first-page":"589","article-title":"SecGOD Google Docs: Now i feel safer!","author":"michalas","year":"2012","journal-title":"2012 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2014.7001843"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref5","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques EUROCRYPT'05"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2600075.2600082"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2525991"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2014.6934507"},{"key":"ref9","first-page":"175","article-title":"Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services","author":"santos","year":"2012","journal-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5220\/0005489302060213"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983930"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0734-z"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912480"},{"key":"ref23","article-title":"The data of things: Strategies, patterns and practice of cloud-based participatory sensing","author":"michalas","year":"2016","journal-title":"Proceedings of the 1st International Conference on Innovations in InfoBusineess and Technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2599851"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2012.6222751"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856693.pdf?arnumber=7856693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:17Z","timestamp":1568836397000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856693","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}