Author:
Garrison III William C.,Lee Adam J.
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Ferrara AL, Fuchsbauer G, Warinschi B (2013) Cryptographically enforced RBAC. In: 2013 IEEE 26th Computer Security Foundations Symposium, pp 115–129. https://doi.org/10.1109/CSF.2013.15
2. Fisch B, Vinayagamurthy D, Boneh D, Gorbunov S (2017) Iron: functional encryption using Intel SGX. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS’17. Association for Computing Machinery, New York, pp 765–782. https://doi.org/10.1145/3133956.3134106
3. Garrison WC, Lee AJ (2015) Decomposing, comparing, and synthesizing access control expressiveness simulations. In: 2015 IEEE 28th Computer Security Foundations Symposium, pp 18–32. https://doi.org/10.1109/CSF.2015.9
4. Garrison WC, Shull A, Myers S, Lee AJ (2016) On the practicality of cryptographically enforcing dynamic access control policies in the cloud. In: 2016 IEEE Symposium on Security and Privacy (SP), pp 819–838. https://doi.org/10.1109/SP.2016.54
5. Park S, Lee K, Lee DH (2015) New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans Inf Forensics Secur 10(8):1564–1577. https://doi.org/10.1109/TIFS.2015.2419180