securing_access_to_cloud_storage
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| securing_access_to_cloud_storage [2013/05/10 17:53] – [The Proposed Approach] m.r.asghar@unitn.it | securing_access_to_cloud_storage [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 21: | Line 21: | ||
| * [[http:// | * [[http:// | ||
| - | * Mihaela Ion | ||
| - | * [[http:// | ||
| * [[http:// | * [[http:// | ||
| + | * [[http:// | ||
| + | * Mihaela Ion | ||
| ==== Publications ==== | ==== Publications ==== | ||
| - | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON< | + | |
| + | | ||
| * Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**, | * Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**, | ||
| * Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON< | * Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON< | ||
| - | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, | + | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, |
| - | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Securing Data Provenance in the Cloud**, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, | + | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Securing Data Provenance in the Cloud**, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, |
| ==== Talks, Tutorials and Demo ==== | ==== Talks, Tutorials and Demo ==== | ||
| + | * Muhammad Rizwan Asghar, **ESPOON: Enforcing Security Policies in Outsourced Environments**, | ||
| * Muhammad Rizwan Asghar, **Enforcing Security Policies in Outsourced Environments**, | * Muhammad Rizwan Asghar, **Enforcing Security Policies in Outsourced Environments**, | ||
| * Muhammad Rizwan Asghar, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, | * Muhammad Rizwan Asghar, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, | ||
| Line 46: | Line 48: | ||
| ==== Software ==== | ==== Software ==== | ||
| - | * We have developed prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http:// | + | * As a result of this research activity, we have developed |
securing_access_to_cloud_storage.1368201231.txt.gz · Last modified: (external edit)
