Admission control policy and key agreement based on anonymous identity in cloud computing.
D. PaulrajS. NeelakandanMohan PrakashE. BaburajPublished in: J. Cloud Comput. (2023)
Keyphrases
- cloud computing
- control policy
- key agreement
- long run
- security properties
- computing resources
- elliptic curve
- secret key
- reinforcement learning
- data management
- service providers
- distributed computing
- data center
- diffie hellman
- peer to peer
- security issues
- trusted computing
- average cost
- machine learning
- real time
- operating system
- security requirements
- data collection
- distributed systems
- low cost