Login / Signup
End-to-end policy based encryption techniques for multi-party data management.
Michael Beiter
Marco Casassa Mont
Liqun Chen
Siani Pearson
Published in:
Comput. Stand. Interfaces (2014)
Keyphrases
</>
end to end
multi party
data management
admission control
privacy preserving
database systems
query processing
congestion control
data warehouse
wireless ad hoc networks
ad hoc networks
cloud computing
key management
encryption scheme
optimal policy
mental states
content delivery
ciphertext
multi agent systems