Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] S Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, ―Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds‖, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS [2] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, ―Toward Secure and Dependable Storage Services in Cloud Computing,‖ IEEE Trans. Services Computing, Apr.- June 2012. [3] H. Li, Y. Dai, L. Tian, and H. Yang, ―IdentityBased Authentication for Cloud Computing,‖ Proc. First Int’l Conf. Cloud Computing, 2009. [4] C. Gentry, ―A Fully Homomorphic Encryption Scheme,‖ PhD dissertation, Stanford Univ., 2009. [5] A.-R. Sadeghi, T. Schneider, and M. Winandy, ―Token-Based Cloud Computing,‖ Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), 2010. [6] M. Li, S. Yu, K. Ren, and W. Lou, ―Securing Personal Health Records in Cloud Computing: PatientCentric and Fine-Grained Data Access Control in Multi-Owner Settings,‖ Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), 2010. [7] S. Yu, C. Wang, K. Ren, and W. Lou, ―Attribute Based Data Sharing with Attribute Revocation,‖ Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2010. [8] G. Wang, Q. Liu, and J. Wu, ―Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,‖ Proc. 17th ACM Conf. Computer and Comm. Security (CCS), 2010. [9] F. Zhao, T. Nishide, and K. Sakurai, ―Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,‖ Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), 2011. [10] S. Ruj, A. Nayak, and I. Stojmenovic, ―DACC: Distributed Access Control in Clouds,‖ Proc. IEEE 10th Int’l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011. [11] S.SeenuIropia, R.Vijayalakshmi, ―Decentralized Access Control Of Data Stored In Clouds Using Key Policy Attribute Based Encryption‖, International Journal Of Invention In Computer Science And Engineering, 2014.
V2I1266.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|