Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforce-ment of the access control policies protecting the information exchanged in a distributed system, but none of them addresses the dynamicity characterizing virtual organizations. In this paper we propose a dynamic hiearchical attribute-based encryption (D-HABE) scheme that allows the institutions in a virtual organiza-tion to encrypt information according to an attribute-based policy in such a way that only users with the appropriate attributes can decrypt it. In addition, we introduce a key management scheme that determines which user i...
In the IT industry cloud computing is considered as one of the most important paradigms. In cloud co...
Attribute based systems enable fine-grained access control among a group of users each identified by a...
Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained acces...
Virtual organizations are dynamic, inter-organizational collaborations that involve systems and serv...
In several distributed systems a user should only be able to access data if a user posses a certain ...
International audienceIn several distributed systems a user should only be able to access data if a ...
As more businesses engage in globalization, inter-organizational collaborative computing grows in im...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
In this thesis we examine several aspects of data-centric security. In particular, we take a look at...
Cloud computing refers to the application and service that run on a distributed system using virtual...
Nowadays usage of cloud computing is increasing in popularity and this raises new data protection ch...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
In the IT industry cloud computing is considered as one of the most important paradigms. In cloud co...
Attribute based systems enable fine-grained access control among a group of users each identified by a...
Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained acces...
Virtual organizations are dynamic, inter-organizational collaborations that involve systems and serv...
In several distributed systems a user should only be able to access data if a user posses a certain ...
International audienceIn several distributed systems a user should only be able to access data if a ...
As more businesses engage in globalization, inter-organizational collaborative computing grows in im...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
In this thesis we examine several aspects of data-centric security. In particular, we take a look at...
Cloud computing refers to the application and service that run on a distributed system using virtual...
Nowadays usage of cloud computing is increasing in popularity and this raises new data protection ch...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
In the IT industry cloud computing is considered as one of the most important paradigms. In cloud co...
Attribute based systems enable fine-grained access control among a group of users each identified by a...
Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained acces...