Jianwei Niu, Yier Jin, Adam J. Lee, R. Sandhu, Wenyuan Xu, Xiaoguang Zhang
{"title":"Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges","authors":"Jianwei Niu, Yier Jin, Adam J. Lee, R. Sandhu, Wenyuan Xu, Xiaoguang Zhang","doi":"10.1145/2914642.2927920","DOIUrl":"https://doi.org/10.1145/2914642.2927920","url":null,"abstract":"In response to the new security and privacy concerns raised by emerging Internet of Things (IoT) technology, this panel discusses the current efforts and challenges to secure the IoT devices and to protect the integrity and privacy of users' data.","PeriodicalId":388649,"journal":{"name":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation","authors":"Sherman S. M. Chow","doi":"10.1145/2914642.2914659","DOIUrl":"https://doi.org/10.1145/2914642.2914659","url":null,"abstract":"Attribute-based encryption (ABE) is a cryptographic tool for fine-grained data access control. For practical needs, an ABE scheme should support multiple authority and revocation. Furthermore, decryption should also be outsourced for higher efficiency. Researchers have been extending existing ABE schemes for these goals. Yet, the rationales are often hidden behind tailor-made number-theoretic constructions. This paper proposes a framework for constructing multi-authority ABE schemes with attribute revocation and outsourced decryption, from any pairing-based single-authority ABE scheme which satisfies a set of properties we identified.","PeriodicalId":388649,"journal":{"name":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115408524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","authors":"X. S. Wang, Lujo Bauer, F. Kerschbaum","doi":"10.1145/2914642","DOIUrl":"https://doi.org/10.1145/2914642","url":null,"abstract":"","PeriodicalId":388649,"journal":{"name":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}