Login / Signup
Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
Syh-Yuan Tan
Published in:
IEEE Access (2018)
Keyphrases
</>
access control
unauthorized access
database
databases
security model
security policies
data security
service providers
high dimensional data
role based access control
data protection
identity management