ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
Muhammad Rizwan AsgharMihaela IonGiovanni RusselloBruno CrispoPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- security policies
- ubiquitous computing environments
- access control
- network security
- access control systems
- security concerns
- security requirements
- security management
- distributed systems
- service providers
- third party
- home network
- access control policies
- unauthorized access
- multilevel secure
- object recognition
- database systems
- real world