Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption.
Naîma MeddahAhmed ToumanariPublished in: Int. J. Cloud Comput. (2016)
Keyphrases
- cloud computing
- access control
- access control policies
- identity management
- rbac model
- data center
- security policies
- fine grained
- distributed computing
- data management
- service providers
- role based access control
- security mechanisms
- conflict resolution
- distributed environment
- security requirements
- data privacy
- security issues
- power consumption
- computing platform
- security analysis
- trusted computing