International audienceSeveral distributed storage solutions that do not rely on a central server have been proposed over the last few years. Most of them are deployed on public networks on the internet. However, these solutions often do not provide a mechanism for access rights to enable the users to control who can access a specific file or piece of data. In this article, we propose Mutida (from the Latin word "Aditum" meaning "access"), a protocol that allows the owner of a file to delegate access rights to another user. This access right can then be delegated to a computing node to process the piece of data. The mechanism relies on the encryption of the data, public key/value pair storage to register the access control list and on a func...
Abstract — Cloud provides storage as a service where the data can be stored and retrieved remotely. ...
In the past few years, outsourcing private data to untrusted servers has become an important challen...
With the emergence of the Internet of Things (IoT)technology, devices are becoming more ubiquitous a...
This article describes mechanisms for offline delegation of access rights to files maintained by a d...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
This article describes mechanisms for offline delegation of access rights to files maintained by a d...
Authentication and authorization systems can be found in almost every software system, and consequen...
The evolution of information and communication technologies (ICTs) has introduced new ways for shari...
In this paper we propose a protocol that allows end-users in a decentralized setup (without requirin...
International audienceConfidential data stored on mass storage devices is at risk to be disclosed to...
This paper presents an architecture of a Personal Information Management System, in which individual...
We demonstrate that symmetric-key cryptography can be used for both read and write access control. O...
We propose a trusted third party free protocol for secure (in terms of content access, manipulation,...
Abstract — Cloud storages are generally hosted by third parties where data can be stored and shared....
The ARDA group has developed an efficient method for fine-grained access authorization in distribute...
Abstract — Cloud provides storage as a service where the data can be stored and retrieved remotely. ...
In the past few years, outsourcing private data to untrusted servers has become an important challen...
With the emergence of the Internet of Things (IoT)technology, devices are becoming more ubiquitous a...
This article describes mechanisms for offline delegation of access rights to files maintained by a d...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
This article describes mechanisms for offline delegation of access rights to files maintained by a d...
Authentication and authorization systems can be found in almost every software system, and consequen...
The evolution of information and communication technologies (ICTs) has introduced new ways for shari...
In this paper we propose a protocol that allows end-users in a decentralized setup (without requirin...
International audienceConfidential data stored on mass storage devices is at risk to be disclosed to...
This paper presents an architecture of a Personal Information Management System, in which individual...
We demonstrate that symmetric-key cryptography can be used for both read and write access control. O...
We propose a trusted third party free protocol for secure (in terms of content access, manipulation,...
Abstract — Cloud storages are generally hosted by third parties where data can be stored and shared....
The ARDA group has developed an efficient method for fine-grained access authorization in distribute...
Abstract — Cloud provides storage as a service where the data can be stored and retrieved remotely. ...
In the past few years, outsourcing private data to untrusted servers has become an important challen...
With the emergence of the Internet of Things (IoT)technology, devices are becoming more ubiquitous a...