2016 SAI Computing Conference (SAI) 2016
DOI: 10.1109/sai.2016.7556117
|View full text |Cite
|
Sign up to set email alerts
|

Sticky policy enabled authenticated OOXML

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…AES 256). compared to 3072 and 4096 RSA operations applied to pseudo random AES 256 key [10] Results show (see Fig. 5) that RSA with key size 4096 requires more time than Pairing Based Cryptography, i.e.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…AES 256). compared to 3072 and 4096 RSA operations applied to pseudo random AES 256 key [10] Results show (see Fig. 5) that RSA with key size 4096 requires more time than Pairing Based Cryptography, i.e.…”
Section: Discussionmentioning
confidence: 99%
“…6. DAC Policy (tp) and Sticky-Policy (ts) DB queries response time [10] Finally the last OOXML and XACML evaluation using explicit relationship and master document model [11] from WordprocessingML subclause shown that described here granular access control method can be used to control access to sub-documents. Whereas policy access response denied resource Write access model added Read-Only attribute to master document what was represented as a padlock on the document outline (see Fig.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, [43] uses Identity-Base Encryption scheme to encrypt cloud-stored artifacts with their own lifecycle as public key. In addition to ensure data confidentiality, it prevents the lifecycle to be tampered as the unchanged private key would not be able to decipher the resulting artifact.…”
Section: Cryptographic Approachesmentioning
confidence: 99%