Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing.
Axin WuYinghui ZhangJianhao ZhuQiuxia ZhaoYu ZhangPublished in: IEEE Trans. Cloud Comput. (2024)
Keyphrases
- cloud computing
- access control
- identity management
- data center
- security policies
- data management
- distributed computing
- service providers
- security mechanisms
- security issues
- mobile devices
- mobile phone
- network access
- data privacy
- mobile computing
- access control policies
- computing platform
- data mining
- mobile users
- computing environments
- security requirements
- cost effective
- context aware
- end users