Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud

B. R. Purushothama, B. Shrinath, B. B. Amberker. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud. IJICT, 5(2):167-186, 2013. [doi]

@article{PurushothamaSA13,
  title = {Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud},
  author = {B. R. Purushothama and B. Shrinath and B. B. Amberker},
  year = {2013},
  doi = {10.1504/IJICT.2013.053116},
  url = {http://dx.doi.org/10.1504/IJICT.2013.053116},
  researchr = {https://researchr.org/publication/PurushothamaSA13},
  cites = {0},
  citedby = {0},
  journal = {IJICT},
  volume = {5},
  number = {2},
  pages = {167-186},
}