2013 International Conference on Advanced Computing and Communication Systems 2013
DOI: 10.1109/icaccs.2013.6938719
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical identity role based proxy re-encryption scheme for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…However, in this work, we will show that their system has several security flaws. So far, lots of PRE-related cryptographic protocols [25][26][27][28][29][30][31][32][33][34][35][36] have been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…However, in this work, we will show that their system has several security flaws. So far, lots of PRE-related cryptographic protocols [25][26][27][28][29][30][31][32][33][34][35][36] have been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Central Authentication Service (CAS) performs distributed identity and it also presents architecture for distributed identity services in cloud dependent technologies. In federated identity management design, such as OpenID Connect, it does not require registration in cloud for accessing [6]. However, incorporation between identity management and cloud computing is still a trail-particularly with respect to privacy and security issues [7].…”
Section: Introductionmentioning
confidence: 99%