References
[1]. Mohamed Nabeel and Elisa Bertino, (2014). “Privacy Preserving Delegated Access Control in Public Clouds",
IEEE Transactions on Knowledge and Data Engineering,
Vol. 26, No. 9, pp. 2268-2280.
[2]. M. Nabeel and E. Bertino, (2012). “Privacy Preserving
Delegated Access Control in the Storage as a Service
Model,” Proc. IEEE Int'l Conf. Information Reuse and
Integration (IRI), pp. 645-652.
[3]. M. Nabeel, N. Shang, and E. Bertino, (2013). “Privacy
Preserving Policy Based Content Sharing in Public Clouds,”
IEEE Trans. Knowledge and Data Eng, Vol. 25, No. 11, pp.
2602-2614.
[4]. M. Nabeel and E. Bertino, (2011). “Towards Attribute
Based Group Key Management,” Proc. 18th ACM Conf.
Computer and Comm. Security, pp.821-824.
[5]. M. Nabeel and E. Bertino, (2010). “Attribute Based
Group Key Management,” Centre for Education and
Research, pp. 1-38.
[6]. S.D.C. di Vimercati, S. Foresti, S. Jajodia, S.
Paraboschi, and P. Samarati, (2007). “Over-Encryption:
Management of Access Control Evolution on Outsourced
Data,” Proc. 33rd Int'l Conf. Very Large Data Bases (VLDB
'07), pp. 123-134.
[7]. A. Fiat and M. Naor, (1994). “Broadcast Encryption,”
Proc. 13th Ann. Int'l Cryptology Conf. Advances in
Cryptology (CRYPTO '93), pp. 480-491.
[8]. A. Shamir, (1979). “How to Share a Secret,” Comm. of
the ACM, Vol. 22, pp. 612-613.
[9]. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters,
(2006). “Secure Attribute-Based Systems,” Proc. 13th ACM
Conf. Computer and Comm. Security (CCS '06), pp. 99-
112.
[10]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, (2006).
“Attribute-Based Encryption for Fine-Grained Access
Control of Encrypted Data,” Proc. 13th ACM Conf.
Computer and Comm. Security (CCS '06), pp. 89-98.
[11]. X. Liang, Z. Cao, H. Lin, and J. Shao, (2009). “Attribute
Based Proxy Re-Encryption with Delegating Capabilities,”
Proc. Fourth Int'l Symp.Information, Computer, and
Comm. Security (ASIACCS '09), pp. 276-286.
[12]. J.-M. Do, Y.-J. Song, and N. Park, (2011). “Attribute
Based Proxy Re-Encryption for Data Confidentiality in
Cloud Computing Environments,” Proc. First Int'l Conf.
Computers, Networks, Systems and Industrial Eng., pp.
248-251.