Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
3
Page No.
578 - 592
References
Arun, M. and S. Saravanan, 2013. Reversible arithmetic logic gate for quantum computation. Int. J. Intell. Eng. Syst., 6: 1-9.
Buyya, R., 2013. Introduction to the IEEE transactions on cloud computing. IEEE. Trans. Cloud Comput., 1: 3-21.
Direct Link | Chen, J. and H. Ma, 2014. Efficient decentralized attribute-based access control for cloud storage with user revocation. Proceedings of the 2014 IEEE International Conference on Communications (ICC), June 10-14, 2014, IEEE, Sydney, NSW., pp: 3782-3787.
Hasan, M.M., 2008. Low-cost realization of toffoli gate for the low-cost synthesis of quantum ternary logic functions. Proceedings of the 11th International Conference on Computer and Information Technology ICCIT 2008, December 24-27, 2008, IEEE, Khulna, Bangladesh, pp: 259-263.
Kuhn, D.R., E.J. Coyne and T.R. Weil, 2010. Adding attributes to role-based access control. IEEE. Comput., 43: 79-81.
Direct Link | Maslov, D., C.Young, D.M. Miller and G.W. Dueck, 2005. Quantum circuit simplification using templates. Proceedings of the Conferences Design, Automation and Test in Europe 2005, March 7-11, 2005, IEEE, USA., ISBN: 0-7695-2288-2, pp: 1208-1213.
Qiao, Z., S. Liang, S. Davis and H. Jiang, 2014. Survey of attribute based encryption. Proceedings of the 2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), June 30-July 2, 2014, IEEE, Las Vegas, NV., pp: 1-6.
Ruj, S., A. Nayak and I. Stojmenovic, 2011. Dacc: Distributed access control in clouds. Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), November 16-18, 2011, IEEE, Changsha, China, pp: 91-98.
Ruj, S., M. Stojmenovic and A. Nayak, 2014. Decentralized access control with anonymous authentication of data stored in clouds. Parallel Distrib. Syst. IEEE. Trans., 25: 384-394.
CrossRef | Direct Link | Shaikh, F.B. and S. Haider, 2011. Security threats in cloud computing. Proceedings of the International Conference on Internet Technology and Secured Transactions, December 11-14, 2011, Abu Dhabi, pp: 214-219.
Sharbaf, M.S., 2009. Quantum cryptography: A new generation of information technology security system. Proceedings of the Sixth International Conference on Information Technology: New Generations ITNG'09, April 27-29, 2009, IEEE, Las Vegas, NV., pp: 1644-1648.
Wang, C., Q. Wang, K. Ren, N. Cao and W. Lou, 2012. Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput., 5: 220-232.
CrossRef |