21![Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2 Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2](https://www.pdfsearch.io/img/a54e0c4c96ff3407693128af1f005ddf.jpg) | Add to Reading ListSource URL: www.e7n.chLanguage: English |
---|
22![Anonymous Access Control with Attribute-Based Encryption Robert R. Enderlein School of Computer and Communication Sciences Anonymous Access Control with Attribute-Based Encryption Robert R. Enderlein School of Computer and Communication Sciences](https://www.pdfsearch.io/img/a1cb05a82aa0b7bf17df69922002b87b.jpg) | Add to Reading ListSource URL: www.e7n.chLanguage: English |
---|
23![Paper Title (use style: paper title) Paper Title (use style: paper title)](https://www.pdfsearch.io/img/97060699947326d1b841c478fcd38b36.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2013-06-07 14:08:57
|
---|
24![Access Sentinel Authorization Policy Server for Attribute Based Access Control ViewDS Access Sentinel Access Sentinel Authorization Policy Server for Attribute Based Access Control ViewDS Access Sentinel](https://www.pdfsearch.io/img/52d98ccbe74c6237c8a9c0759b138a61.jpg) | Add to Reading ListSource URL: www.viewds.comLanguage: English |
---|
25![Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey† Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†](https://www.pdfsearch.io/img/c9c1ef3590b74e67a7f7e2d3d2973db5.jpg) | Add to Reading ListSource URL: www.caida.orgLanguage: English - Date: 2015-02-04 04:34:32
|
---|
26![Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R](https://www.pdfsearch.io/img/a3b8e0117907806c0ce402f0283ac14a.jpg) | Add to Reading ListSource URL: wwwold.iit.cnr.itLanguage: English - Date: 2014-09-19 11:36:58
|
---|
27![Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche](https://www.pdfsearch.io/img/aa45d03fc6087f7d5f1f46356b031525.jpg) | Add to Reading ListSource URL: wwwold.iit.cnr.itLanguage: English - Date: 2014-09-19 11:36:58
|
---|
28![Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey† Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†](https://www.pdfsearch.io/img/22edbb22b83db28c26afe30d64e73308.jpg) | Add to Reading ListSource URL: research.microsoft.comLanguage: English - Date: 2012-05-29 07:38:50
|
---|
29![Attribute Based Access Control (ABAC) Workshop Minutes from July 2013 Workshop Attribute Based Access Control (ABAC) Workshop Minutes from July 2013 Workshop](https://www.pdfsearch.io/img/49f1072123d7d9ae21e1ddccee51203b.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2013-08-07 10:47:35
|
---|
30![ATTRIBUTE BASED ACCESS CONTROL Draft February 21, 2014 [removed] ATTRIBUTE BASED ACCESS CONTROL Draft February 21, 2014 [removed]](https://www.pdfsearch.io/img/a6b7318c30a9170566f840c1d5b20ece.jpg) | Add to Reading ListSource URL: nccoe.nist.govLanguage: English - Date: 2014-06-30 15:11:20
|
---|