Completed
Overview
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Cloud Data Outsourcing
- 3 Traditional Access Control
- 4 Advanced Cryptography
- 5 Cost of Advanced Cryptography
- 6 Overview
- 7 System Model
- 8 RoleBased Access Control
- 9 RoleBased Encryption
- 10 Revoking Access
- 11 Using Key Versioning
- 12 Evaluation
- 13 Reallife APIs
- 14 Cost of Revocation
- 15 Revocation Frequency
- 16 Lazy Encryption
- 17 Delaying State Change
- 18 Advanced Crypto
- 19 Future Research
- 20 Conclusion