Verifiable Delegation of Polynomials.
Jun YeHaiyan ZhangChangyou FuPublished in: Int. J. Netw. Secur. (2016)
Keyphrases
- conflict resolution
- access control
- sufficient conditions
- database
- access control systems
- cooperative
- low order
- security policies
- neural network
- cross domain
- metadata
- artificial intelligence
- higher order
- case study
- access control policies
- information retrieval
- role based access control
- secret sharing
- real world
- algebraic curves
- lagrange interpolation