Author:
Gallo P.,Andò A.,Garbo G.
Publisher
Springer International Publishing
Reference34 articles.
1. Li J, Chen X, Li J, Jia C, Ma J, Lou W (2013) Fine-grained access control system based on outsourced attribute-based encryption. In: Proceedings of the 8th European symposium on research in computer security (ESORICS 2013), Egham, UK, Computer Security—ESORICS 2013, Lecture Notes in Computer Science, Springer, vol 8134, pp 592–609
2. Zhu Y, Ma D, Hu CJ, Huang D (2013) How to use attribute-based encryption to implement role-based access control in the cloud. In: Proceedings of the international workshop on security in cloud computing 2013 (cloud computing ‘13), ACM, pp 33–40
3. McDaniel P, Prakash A (2006) Methods and limitations of security policy reconciliation. ACM Trans Inf Syst Secur 9(3):259–291
4. Liu Q, Safavi-Naini R, Sheppard NP (2003) Digital rights management for content distribution. In: Proceedings of the Australasian information security workshop on ACSW frontiers, Feb 2003, Adelaide (Australia), vol 21, pp 49–58
5. www.adobe.com/solutions/ebook/content-server.html