References
[1]. Mohamed Nabeel and Elisa Bertino (2014), “Privacy
Preserving Delegated Access Control in Public Clouds",
IEEE Transactions on Knowledge and Data Engineering,
Vol. 26, No. 9, pp. 2268 – 2280.
[2]. V. Goyal, O. Pandey, A. Sahai, and B. Waters (2006),
“Attribute-Based Encryption for Fine-Grained Access
Control of Encrypted Data,” Proc. 13th ACM Conf.
Computer and Comm. Security (CCS '06), pp. 89-98.
[3]. E. Bertino and E. Ferrari (2002), “Secure and Selective
Dissemination of XML Documents,” ACM Trans.
Information and System Security, Vol. 5, No. 3, pp. 290-
321.
[4]. M. Nabeel and E. Bertino (2012), “Privacy Preserving
Delegated Access Control in the Storage as a Service
Model,” Proc. IEEE Int'l Conf. Information Reuse and
Integration (IRI), pp. 645 – 652.
[5]. M. Nabeel and E. Bertino (2014), “Attribute Based
Group Key Management,” to appear in Trans. Data
Privacy, Vol.7, No. 3,pp.309-336.
[6]. X. Liang, Z. Cao, H. Lin, and J. Shao (2009), “Attribute
Based Proxy Re-Encryption with Delegating Capabilities,”
Proc. Fourth Int'l Symp.Information, Computer, and
Comm. Security (ASIACCS '09), pp. 276-286.
[7]. G. Miklau and D. Suciu (2003), “Controlling Access to
Published Data Using Cryptography,” Proc. 29th Int'l Conf.
Very Large Data Bases (VLDB '03), pp. 898-909.
[8]. N. Shang, M. Nabeel, F. Paci, and E. Bertino (2010), “A
Privacy-Preserving Approach to Policy-Based Content
Dissemination,” Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE
'10), pp. 944 – 955.
[9]. M. Nabeel, N. Shang, and E. Bertino (2013), “Privacy Preserving Policy Based Content Sharing in Public Clouds,”
IEEE Trans. Knowledge and Data Eng., Vol. 25, No. 11, pp.
2602-2614.
[10]. M. Nabeel and E. Bertino (2011), “Towards Attribute
Based Group Key Management,” Proc. 18th ACM Conf.
Computer and Comm. Security, pp. 821-824.
[11]. M.Nabeel, E. Bertino, M. Kantarcioglu, and B.M.
Thuraisingham (2011), “Towards Privacy Preserving
Access Control in the Cloud,” Proc. Seventh Int'l Conf.
Collaborative Computing: Networking, Applications and
Worksharing (CollaborateCom '11), pp. 172-180.
[12]. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters
(2006), “Secure Attribute-Based Systems,” Proc. 13th ACM
Conf. Computer and Comm. Security (CCS '06), pp. 99-
112.
[13]. J. Li and N. Li (2006), “OACerts: Oblivious Attribute
Certificates,” IEEE Trans. Dependable and Secure
Computing, Vol. 3, No. 4, pp. 340-352.
[14]. T. Pedersen (1992), “Non-Interactive and
Information-Theoretic Secure Verifiable Secret Sharing,”
Proc. 11th Ann. Int'l Cryptology Conf. Advances in
Cryptology (CRYPTO '91), pp. 129-140.
[15]. A. Sahai and B. Waters (2005), “Fuzzy Identity-Based
Encryption,” Proc. 24th Ann. Int'l Conf. Theory and
Applications of Cryptographic Techniques(Eurocrypt '05),
pp. 457-473.
[16]. J. Bethencourt, A. Sahai, and B. Waters (2007),
“Ciphertext-Policy Attribute-Based Encryption,” Proc. IEEE
Symp. Security and Privacy (SP'07), pp. 321-334.