Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. “Privacy preserving delegated access control in the storage as a service model,”M. Nabeel and E. Bertino, in EEE International Conference on Information Reuse andIntegration(IRI), 2012.
    2. “Secure and selective dissemination of XML documents,” E. Bertino and E. errari, ACM Trans.Inf. Syst. Secur., vol. 5, no. 3, pp. 290– 331, 2002.
    3. “Controlling access to published data using cryptography,”G. Miklau and D. Suciu,inVLDB ’2003: Proceedings of the 29th international conference on Very large data bases.VLDB Endowment, 2003, pp. 898–909.
    4. “A privacy-preserving approach to policy-based content dissemination,” N. Shang, M. Nabeel, F. Paci, and E. Bertino,in ICDE ’10: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010.
    5. “Towards privacy preserving access control in the cloud,”M. Nabeel, E. Bertino, M. Kantarcioglu, and B. M. Thuraisingham, in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, ser. CollaborateCom ’11, 2011, pp. 172–180.
    6. “Privacy preserving policy based content sharing in public clouds,” M.Nabeel,N.Shang,andE.Bertino, IEEE Transactions on Knowledge and Data Engineering, 2012.
    7. “Over-encryption: Management of access control evolution on outsourced data,” S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, in Proceedings of the 33rd International Conference on VeryL arge Data Bases, ser.VLDB ’07. VLDB Endowment,2007, pp. 123–134.
    8. “Towards attribute based group key management,” M. Nabeel and E. Bertino, in Proceedings of the 18th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2011.
    9. “Broadcast encryption,” A. Fiat and M. Naor, in Proceedings of the 13th Annual International Cryptology Conference on Advances inCryptology,ser.CRYPTO ’93. London, UK:Springer-Verlag, 1994, pp. 480–491. 10.“Revocation and tracing schemes for stateless receivers,” D. Naor, M. Naor, and J. B. Lotspiech, in Proceedings of the 21st Annual International Conference on Advances in Cryptology, ser. CRYPTO ’01. London, UK: Springer-Verlag, 2001, pp. 41– 62.

Recent Article