Login / Signup
Decentralized access control technique with multi-tier authentication of user for cloud storage.
S. Shiny
J. Jasper
Published in:
Peer-to-Peer Netw. Appl. (2022)
Keyphrases
</>
access control
multi tier
fine grained
security requirements
security policies
database management
distributed systems
access control policies
end users
user experience
peer to peer
operating system
security analysis