• Login
    Browsing Institute for Information Security & Privacy (IISP) by Subject 
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Browsing Institute for Information Security & Privacy (IISP) by Subject
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Browsing Institute for Information Security & Privacy (IISP) by Subject
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Institute for Information Security & Privacy (IISP) by Subject "User-centric storage model"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-1 of 1

    • title
    • issue date
    • submit date
    • type
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • SEIVE: Cryptographically Enforced Access Control for User Data in Untrusted Clouds 

        Wang, Frank (Georgia Institute of Technology, 2016-09-30)
        Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence ...

        Browse

        All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CommunityDatesAuthorsTitlesSubjectsTypes

        My SMARTech

        Login
        • About
        • Terms of Use
        • Contact Us
        • Emergency Information
        • Legal & Privacy Information
        • Accessibility
        • Accountability
        • Accreditation
        • Employment
        • Login
        Georgia Tech

        © Georgia Institute of Technology

        • About
        • Terms of Use
        • Contact Us
        • Emergency Information
        • Legal & Privacy Information
        • Accessibility
        • Accountability
        • Accreditation
        • Employment
        • Login
        Georgia Tech

        © Georgia Institute of Technology