Sign in

Study and Implementation of Trust Evaluation Access Control Mechanism Based on XEN.

Yingxu LaiRuozeng WangYang Zhen
Published in: HPCC-ICESS (2012)
Keyphrases
  • trust evaluation
  • privacy preserving