G
Gansen Zhao
Researcher at South China Normal University
Publications - 95
Citations - 1338
Gansen Zhao is an academic researcher from South China Normal University. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 17, co-authored 83 publications receiving 1117 citations. Previous affiliations of Gansen Zhao include Guangdong University of Foreign Studies & University of Kent.
Papers
More filters
Book ChapterDOI
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
TL;DR: By adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.
Proceedings ArticleDOI
Trusted Data Sharing over Untrusted Cloud Storage Providers
TL;DR: A system for trusted data sharing through untrusted cloud providers is constructed, which can imperatively impose the access control policies of data owners, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data.
Journal IssueDOI
PERMIS: a modular authorization infrastructure
TL;DR: The PERMIS role-based authorization infrastructure along with its conceptual authorization, access control, and trust models has the novel concept of a credential validation service, which verifies a user's credentials prior to access control decision-making and enables the distributed management of credentials.
Journal ArticleDOI
Fast algorithms to evaluate collaborative filtering recommender systems
TL;DR: The mathematical regularities underlying the similarity formulas are explored, a novel data structure is introduced, and linear time algorithms to calculate the similarities are designed to shorten the evaluation time and contribute to increasing the efficiency of design and development of recommender systems.
Proceedings ArticleDOI
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing
Jin Li,Gansen Zhao,Xiaofeng Chen,Dongqing Xie,Chunming Rong,Wenjun Li,Lianzhang Tang,Yong Tang +7 more
TL;DR: This paper addresses this challenging open issue by defining and enforcing access policies based on data attributes and implementing user accountability by using traitor tracing, and shows that the proposed scheme is highly efficient and provably secure under existing security models.