scispace - formally typeset
G

Gansen Zhao

Researcher at South China Normal University

Publications -  95
Citations -  1338

Gansen Zhao is an academic researcher from South China Normal University. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 17, co-authored 83 publications receiving 1117 citations. Previous affiliations of Gansen Zhao include Guangdong University of Foreign Studies & University of Kent.

Papers
More filters
Book ChapterDOI

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

TL;DR: By adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.
Proceedings ArticleDOI

Trusted Data Sharing over Untrusted Cloud Storage Providers

TL;DR: A system for trusted data sharing through untrusted cloud providers is constructed, which can imperatively impose the access control policies of data owners, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data.
Journal IssueDOI

PERMIS: a modular authorization infrastructure

TL;DR: The PERMIS role-based authorization infrastructure along with its conceptual authorization, access control, and trust models has the novel concept of a credential validation service, which verifies a user's credentials prior to access control decision-making and enables the distributed management of credentials.
Journal ArticleDOI

Fast algorithms to evaluate collaborative filtering recommender systems

TL;DR: The mathematical regularities underlying the similarity formulas are explored, a novel data structure is introduced, and linear time algorithms to calculate the similarities are designed to shorten the evaluation time and contribute to increasing the efficiency of design and development of recommender systems.
Proceedings ArticleDOI

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing

TL;DR: This paper addresses this challenging open issue by defining and enforcing access policies based on data attributes and implementing user accountability by using traitor tracing, and shows that the proposed scheme is highly efficient and provably secure under existing security models.