Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Guangye Sui"'
Publikováno v:
IEEE Access, Vol 9, Pp 10443-10459 (2021)
Based on Sun et al.'s multi-client symmetric searchable encryption (SSE) scheme (at ESORICS 2016), and combining Zhao's identity-concealed authenticated encryption (CCS 2016), a new SSE scheme with multi-data-owner functionalities is proposed. By set
Externí odkaz:
https://doaj.org/article/2931c7765fea4da282405454a05af28e
Publikováno v:
IEEE Access, Vol 9, Pp 10443-10459 (2021)
Based on Sun et al. ’s multi-client symmetric searchable encryption (SSE) scheme (at ESORICS 2016), and combining Zhao’s identity-concealed authenticated encryption (CCS 2016), a new SSE scheme with multi-data-owner functionalities is proposed. B
Publikováno v:
Information Sciences. 502:109-124
Cloud storage services provide data owners an efficient and flexible way to share data. Among the shared data, some of them are very sensitive, and should be prevented for any leakage. Should users conventionally encrypt the data, however, flexibly s
Autor:
Guangye Sui, Yunlei Zhao
Publikováno v:
CNS
KEA, OPACITY, MQV and HMQV protocols are impor- tant implicitly authenticated Diffe-Hellman key-exchange (IA- DHKE) protocols. By combining the advantages and saving the disadvantages of previous IA-DHKE protocols, OAKE shows promising future. It has
Autor:
Mohamed Mejri, Guangye Sui
Publikováno v:
Foundations and Practice of Security ISBN: 9783319303024
FPS
FPS
This paper introduces a formal program-rewriting approach that can automatically enforce security policies on non trusted programs. For a program P and a security policy \(\varPhi \), we generate another program \(P'\) that respects the security poli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ad77ef4b4e3384034c4070e3e1336c7c
https://doi.org/10.1007/978-3-319-30303-1_22
https://doi.org/10.1007/978-3-319-30303-1_22
Publikováno v:
CISDA
Recent research confirmed that program rewriting techniques are powerful mechanisms for security enforcement, since they gather advantages of both static and dynamic approaches. In a previous work, we introduced the basic ideas underlying a program r
Autor:
Guangye Sui, Mohamed Mejri
Publikováno v:
International Journal of Grid and Utility Computing. 4:204
A correct and a cheap enforcement of security policies on information systems is a major problem for most of our institutions. In previous works, we introduced a program rewriting approach that can automatically and formally enforce security policies