securing_access_to_cloud_storage
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
securing_access_to_cloud_storage [2013/05/10 18:08] – [Software] m.r.asghar@unitn.it | securing_access_to_cloud_storage [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 21: | Line 21: | ||
* [[http:// | * [[http:// | ||
- | * Mihaela Ion | ||
- | * [[http:// | ||
* [[http:// | * [[http:// | ||
+ | * [[http:// | ||
+ | * Mihaela Ion | ||
==== Publications ==== | ==== Publications ==== | ||
- | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON< | + | |
+ | | ||
* Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**, | * Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**, | ||
* Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON< | * Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON< | ||
Line 47: | Line 48: | ||
==== Software ==== | ==== Software ==== | ||
- | * We have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http:// | + | * As a result of this research activity, we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http:// |
securing_access_to_cloud_storage.1368202090.txt.gz · Last modified: (external edit)