![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
1st SCC@AsiaCCS 2013: Hangzhou, China
- Xingming Sun, Elaine Shi, Kui Ren:
Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2067-2
Keynote address
- Robert H. Deng:
Secure access to outsourced data. 1-2
Technical session I
- Diego Perez-Botero, Jakub Szefer, Ruby B. Lee:
Characterizing hypervisor vulnerabilities in cloud computing servers. 3-10 - Zhan Wang, Kun Sun, Jiwu Jing, Sushil Jajodia
:
Verification of data redundancy in cloud storage. 11-18 - Jiawei Yuan, Shucheng Yu
:
Proofs of retrievability with public verifiability and constant communication cost in cloud. 19-26
Technical session II
- Sumanta Sarkar, Reihaneh Safavi-Naini, Liang Feng Zhang:
RAFR: remote assessment of file redundancy. 27-32 - Yan Zhu
, Di Ma
, Changjun Hu, Dijiang Huang
:
How to use attribute-based encryption to implement role-based access control in the cloud. 33-40 - Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu
, Qi Li, Tao Zhang:
PRAM: privacy preserving access management scheme in cloud services. 41-46
Technical session III
- Lei Xu
, Xiaoxin Wu:
Hub: heterogeneous bucketization for database outsourcing. 47-54 - Youwen Zhu, Rui Xu, Tsuyoshi Takagi:
Secure k-NN computation on encrypted cloud data without sharing key with query users. 55-60 - Gang Sheng, Tao Wen, Quan Guo, Ying Yin:
Verifying correctness of inner product of vectors in cloud computing. 61-68
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.