Articles with "access policy" as a keyword



Photo by aleexcif from unsplash

Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0388-7

Abstract: Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-encrypt the message, which makes it impractical.… read more here.

Keywords: policy; access policy; attribute based; access ... See more keywords
Photo from wikipedia

Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2021.3096177

Abstract: Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the potent encryption paradigms in protecting data confidentiality in the cloud data sharing scenario. However, the access policy of the traditional CP-ABE is in plaintext form that reveals… read more here.

Keywords: policy updating; cloud data; policy; abe ... See more keywords
Photo by aleexcif from unsplash

Efficient Attribute Based Server-Aided Verification Signature

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2021.3096420

Abstract: Attribute based signature (ABS) is a novel cryptographic primitive, which permits users to sign a message over attributes without revealing other information. A signature only reveals that it is signed by a signer whose some… read more here.

Keywords: policy; access policy; verification; attribute based ... See more keywords
Photo from wikipedia

The NIH public access policy did not harm biomedical journals

Sign Up to like & get
recommendations!
Published in 2019 at "PLoS Biology"

DOI: 10.1371/journal.pbio.3000352

Abstract: The United States National Institutes of Health (NIH) imposed a public access policy on all publications for which the research was supported by their grants; the policy was drafted in 2004 and took effect in… read more here.

Keywords: policy; access policy; nih public; biomedical journals ... See more keywords

Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption

Sign Up to like & get
recommendations!
Published in 2021 at "Future Internet"

DOI: 10.3390/fi13110279

Abstract: Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being… read more here.

Keywords: storage; cloud data; encryption; access policy ... See more keywords
Photo from wikipedia

Estimated effects of implementing an open access policy for grantees at a private foundation

Sign Up to like & get
recommendations!
Published in 2017 at "PeerJ"

DOI: 10.7717/peerj.3853

Abstract: Background The Gordon and Betty Moore Foundation (GBMF) was interested in understanding the potential effects of requiring that grantees publish their peer-reviewed research in open access journals. Methods We collected data on more than 2,000… read more here.

Keywords: access policy; open access; foundation; estimated effects ... See more keywords