Login / Signup

Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".

Syh-Yuan Tan
Published in: IEEE Access (2018)
Keyphrases
  • access control
  • unauthorized access
  • database
  • databases
  • security model
  • security policies
  • data security
  • service providers
  • high dimensional data
  • role based access control
  • data protection
  • identity management