Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption.
Dominik ZieglerAlexander MarsalekBernd PrünsterJosef SabonguiPublished in: ICETE (2) (2020)
Keyphrases
- access control
- fine grained
- unauthorized access
- dynamic access control
- data security
- security policies
- security model
- access control policies
- ciphertext
- cost effective
- third party
- security mechanisms
- access control systems
- service providers
- attribute based encryption
- role based access control
- access control models
- databases