User Tools

Site Tools


securing_access_to_cloud_storage

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
securing_access_to_cloud_storage [2013/05/10 17:58]
m.r.asghar@unitn.it [Talks, Tutorials and Demo]
securing_access_to_cloud_storage [2021/01/29 10:58] (current)
Line 21: Line 21:
  
   * [[http://​disi.unitn.it/​~asghar/​|Muhammad Rizwan Asghar]] (active)   * [[http://​disi.unitn.it/​~asghar/​|Muhammad Rizwan Asghar]] (active)
-  * Mihaela Ion 
-  * [[http://​www.cs.auckland.ac.nz/​~russello/​|Giovanni Russello]] (active) 
   * [[http://​disi.unitn.it/​~crispo/​|Bruno Crispo]] (active)   * [[http://​disi.unitn.it/​~crispo/​|Bruno Crispo]] (active)
 +  * [[http://​www.cs.auckland.ac.nz/​~russello/​|Giovanni Russello]] (active)
 +  * Mihaela Ion
 ==== Publications ==== ==== Publications ====
  
-  * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON<​sub>​ERBAC</​sub>:​ Enforcing security policies in outsourced environments**,​ Elsevier Computers & Security (COSE), ​2012. In Press. {{asghar12-cose.pdf|PDF}}+  ​* Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, and Mihaela Ion, **Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases**,​ In Proceedings of The 5th ACM Workshop on Cloud Computing Security Workshop (CCSW) in conjunction with the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013.  
 +  ​* Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON<​sub>​ERBAC</​sub>:​ Enforcing security policies in outsourced environments**,​ Elsevier Computers & Security (COSE), ​Volume 35, 2013. {{asghar13-cose.pdf|PDF}}
   * Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**,​ In Proceedings of the 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.   * Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**,​ In Proceedings of the 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.
   * Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON<​sub>​ERBAC</​sub>:​ Enforcing security policies in outsourced environments with encrypted RBAC**, In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, pages 841-844. ACM, 2011.   * Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON<​sub>​ERBAC</​sub>:​ Enforcing security policies in outsourced environments with encrypted RBAC**, In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, pages 841-844. ACM, 2011.
Line 33: Line 34:
 ==== Talks, Tutorials and Demo ==== ==== Talks, Tutorials and Demo ====
  
-  * Muhammad Rizwan Asghar, ​//ESPOON: Enforcing Security Policies in Outsourced Environments//, SRI International,​ Menlo Park, California, USA, August 2012. {{espoon-recent.ppt|Slides}}+  * Muhammad Rizwan Asghar, ​**ESPOON: Enforcing Security Policies in Outsourced Environments**, SRI International,​ Menlo Park, California, USA, August 2012. {{espoon-recent.ppt|Slides}}
   * Muhammad Rizwan Asghar, **Enforcing Security Policies in Outsourced Environments**,​ The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012.   * Muhammad Rizwan Asghar, **Enforcing Security Policies in Outsourced Environments**,​ The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012.
   * Muhammad Rizwan Asghar, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**,​ The 6th IEEE International Conference on Availability,​ Reliability and Security (ARES), Vienna, Austria, August 2011.   * Muhammad Rizwan Asghar, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**,​ The 6th IEEE International Conference on Availability,​ Reliability and Security (ARES), Vienna, Austria, August 2011.
Line 47: Line 48:
  
 ==== Software ==== ==== Software ====
-  * We have developed prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http://​disi.unitn.it/​~asghar/​|Muhammad Rizwan Asghar]].+  * As a result of this research activity, we have developed ​prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http://​disi.unitn.it/​~asghar/​|Muhammad Rizwan Asghar]].
securing_access_to_cloud_storage.1368201483.txt.gz · Last modified: 2021/01/29 10:58 (external edit)