CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
Yi-Ruei ChenCheng-Kang ChuWen-Guey TzengJianying ZhouPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- cloud computing
- access control
- identity management
- data center
- fine grained
- distributed computing
- data management
- security policies
- protection schemes
- role based access control
- security issues
- security mechanisms
- service providers
- smart card
- data mining
- computing platform
- cost effective
- security requirements
- end users