Yahoo Web Search

Search results

  1. Mr Willy Tan Nguan Peng: West Spring Primary School: Advisor: Ms Lim Fong Yee: Physical, Sports & Outdoor Education Branch: 2023. SPSSC Badminton National Senior Div ...

  2. willy peng is on Facebook. Join Facebook to connect with willy peng and others you may know. Facebook gives people the power to share and makes the world more open and connected.

  3. Best web hosting for beginners. by Willypeng. September 27, 2023. 0. Business. Launching your own website can be an exciting journey, whether it's for a personal blog, a small business, or an online portfolio. However, before you can share your content with the world, you need a reliable web hosting service.

  4. An experienced leader in driving Operation Excellence for World-leading companies… · 工作經歷:McKinsey & Company · 教育背景:National Tsing Hua University · 地點:台北 · 500+ 位 LinkedIn 聯絡人。上 LinkedIn 查看Willy...

    • McKinsey & Company
    • Mckinsey & Company
    • 782
    • Guomin YANG
    • See next page for additional authors
    • Citation
    • Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers
    • 3 SACS OVERVIEW
    • 7 PERFORMANCE ANALYSIS
    • 8 CONCLUSION

    Singapore Management University, gmyang@smu.edu.sg

    Follow this and additional works at: https://ink.library.smu.edu.sg/sis_research

    SUSILO, Willy; JIANG, Peng; LAI, Jianchang; GUO, Fuchun; YANG, Guomin; and DENG, Robert H..

    Willy Susilo , Fellow, IEEE, Peng Jiang , Jianchang Lai , Fuchun Guo , Guomin Yang , Senior Member, IEEE, and Robert H. Deng , Fellow, IEEE Abstract—Cloud computing is considered as one of the most prominent paradigms in the information technology industry, since it can significantly reduce the costs of hardware and software resources in computing ...

    SACS aims to provide a flexible access control in terms of both data receivers and data publishers. It enables only valid data receivers, who hold private keys from the author-ity, to access the plain data. With ciphertext sanitizing, SACS prevents malicious data publishers from issuing information that can retrieve decryption key without valid pri...

    We present the performance analysis for our SACS protocol in terms of both communication complexity and computa-tion time. Due to no comparable protocols in the literature, we only evaluate our protocol in the following analysis. To present a fair communication analysis, consider four phases except System Initialization. We use jZpj, and jGj jGTj Z...

    We initiated the study of secure cloud storage in the pres-ence of malicious data publishers, which is a very practical situation that unfortunately has never been studied in the literature previously. In this setting, malicious data publish-ers construct data following the given access control policy, but the ciphertexts can actually be decrypted ...

  5. Mar 1, 2024 · Mdm Peng Binglun: peng_binglun@moe.edu.sg: Subject Head PE & CCA: Mr Mohammed Fadzliegh Nordin: mohammed_fadzliegh_nordin@moe.edu.sg: Subject Head Character & Citizenship Education: Ms Bibiana Wong Ying Ching: wong_ying_ching_bibiana@moe.edu.sg: Subject Head Student Leadership: Mr Zainal Ariffin Bin Kassim: zainal_ariffin_kassim@moe.edu.sg ...

  6. Willy PENG | Cited by 71 | of Overseas Chinese University, Taichung (OCA) | Read 10 publications | Contact Willy PENG