Author:
Hsu Ping-Kun,Lin Mu-Ting,Lin Iuon-Chang
Reference15 articles.
1. Tang, Y., Lee, P.C., Lui, C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Tran. Dependable Secure Comput 9(6), 903–916 (2012)
2. Rahumed, A., Chen, C.H., Tang, Y., Lee, P.C., Lui, C.S.: A secure cloud backup system with assured deletion and version control. In: International Conference on Parallel Processing Workshop, pp. 160–167 (2011)
3. Tezuka, S., Uda, R., Okada, K.: ADEC: assured deletion and verifiable version control for cloud storage. In: 26th IEEE International Conference on Advanced Information Networking and Applications, pp. 23–30 (2012)
4. Perlman, R.: File system design with assured delete. In: Proceedings Network and Distributed System Security Symposium (NDSS) (2007)
5. Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献