Login / Signup
New access control systems based on outsourced attribute-based encryption.
Jin Li
Xiaofeng Chen
Jingwei Li
Chunfu Jia
Jianfeng Ma
Wenjing Lou
Published in:
J. Comput. Secur. (2015)
Keyphrases
</>
access control systems
access control
security policies
ciphertext
third party
access structure
access control policies
service providers
conflict resolution
standard model
diffie hellman
metric space
security requirements
data mining
fine grained