Cremers, C. J. F., Lafourcade, P., and Nadeau, P. (2009).
Comparing state spaces in automatic security proto-
col analysis. In Formal to Practical Security - Papers
Issued from the 2005-2008 French-Japanese Collabo-
ration, pages 70–94. Springer.
governmental organisations (2009). Iso 15408-2: Common
criteria for information technology security evaluation
- part 2: Security functional components.
Govinda, K. and Sathiyamoorthy, E. (2012). Identity
anonymization and secure data storage using group
signature in private cloud. Procedia Technology,
4:495–499.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In ACM CCS’06.
Kremer, S. and Ryan, M. (2005). Analysis of an electronic
voting protocol in the applied pi calculus. In European
Symposium on Programming, pages 186–200.
Lewko, A. and Waters, B. (2011). Decentralizing attribute-
based encryption. In Annual International Confer-
ence on the Theory and Applications of Cryptographic
Techniques, pages 568–588. Springer.
Li, M., Yu, S., Ren, K., and Lou, W. (2010). Securing
personal health records in cloud computing: Patient-
centric and fine-grained data access control in multi-
owner settings. In International Conference on Se-
curity and Privacy in Communication Systems, pages
89–106. Springer.
Maji, H. K., Prabhakaran, M., and Rosulek, M. (2008).
Attribute-based signatures: Achieving attribute-
privacy and collusion-resistance. IACR Cryptology
ePrint Archive, 2008:328.
Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M.,
and Weippl, E. (2011). Dark clouds on the horizon:
Using cloud storage as attack vector and online slack
space. In Proceedings of the 20th USENIX Conference
on Security, SEC’11.
Puys, M. and Lafourcade, P. (2015). Evaluations of cryp-
tographic protocols: Verification tools dealing with al-
gebraic properties. In Foundations and Practice of Se-
curity - FPS 2015. Springer.
Ruj, S., Nayak, A., and Stojmenovic, I. (2011). Dacc: Dis-
tributed access control in clouds. In TrustCom’11,
pages 91–98. IEEE.
Ruj, S., Stojmenovic, M., and Nayak, A. (2012). Privacy
preserving access control with authentication for se-
curing data in clouds. In Cluster, Cloud and Grid
Computing (CCGrid), 2012 12th IEEE/ACM Interna-
tional Symposium on, pages 556–563. IEEE.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 457–473. Springer.
Tang, Z., Wang, X., Jia, L., Zhang, X., and Man, W.
(2012). Study on data security of cloud computing.
In Engineering and Technology (S-CET), 2012 Spring
Congress on, pages 1–3. IEEE.
Wang, B. Y., Ming, J., Zhang, S. M., Jiang, H., and Luo, H.
(2014). An access control method based on cp-abe and
abs algorithm in cloud storage. In Applied Mechanics
and Materials, volume 644, pages 1919–1922. Trans
Tech Publ.
Wang, C., Ren, K., Lou, W., and Li, J. (2010a). Toward
publicly auditable secure cloud data storage services.
IEEE Network, 24(4):19–24.
Wang, G., Liu, Q., and Wu, J. (2010b). Hierarchical
attribute-based encryption for fine-grained access con-
trol in cloud storage services. In ACM CCS’10, pages
735–737.
Ylonen, T. and Lonvick, C. (2006). The secure shell (ssh)
authentication protocol. RFC 4252, RFC Editor.
Yu, S., Wang, C., Ren, K., and Lou, W. (2010). Attribute
based data sharing with attribute revocation. In Pro-
ceedings of the 5th ACM Symposium on Information,
Computer and Communications Security.
Zhang, G., Yang, Y., Zhang, X., Liu, C., and Chen, J.
(2012). Key research issues for privacy protection
and preservation in cloud computing. In Second Inter-
national Conference on Cloud and Green Computing,
CGC’12, pages 47–54.
Zhao, F., Nishide, T., and Sakurai, K. (2011). Realizing
fine-grained and flexible access control to outsourced
data with attribute-based cryptosystems. In Interna-
tional Conference on Information Security Practice
and Experience, pages 83–97. Springer.
SECRYPT 2017 - 14th International Conference on Security and Cryptography
500