MOBIL BULUTLI HISOBLASH UCHUN SAMARALI VA XAVFSIZ MA'LUMOTLARNI SAQLASH OPERATSIYALARI
##semicolon##
atributlarga asoslangan ma'lumotlarni saqlash##common.commaListSeparator## atributlarga asoslangan shifrlash##common.commaListSeparator## bulutli hisoblash##common.commaListSeparator## maxfiylikni saqlaydigan shifrlash siyosati##common.commaListSeparator## mobil qurilmalar##common.commaListSeparator## xavfsizlikAbstrak
Ushbu maqolada bulutli provayderlarga ma'lumotlar tarkibini taqdim etmasdan, simsiz ma'lumotlarni saqlash va olish qurilmalariga e'tibor qaratgan holda ommaviy bulutda ma'lumotlarni saqlash xavfsizligini ta'minlash uchun yaxlit xavfsizlik tizimi keltirilgan.
Yuklashlar
##submission.citations##
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute - based encryption. In SP ’07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321-334, Washington, DC, USA, 2007. IEEE Computer Society.
D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity-based encryption with constant size ciphertext. Advances in Cryptology- EUROCRYPT 2005, pages 440-456, 2005.
##submission.downloads##
Nashr qilingan
Nashr
Bo'lim
##submission.license##
##submission.copyrightStatement##
##submission.license.cc.by-nc-nd4.footer##