Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
Shaohua TangXiaoyu LiXinyi HuangYang XiangLingling XuPublished in: IEEE Trans. Computers (2016)
Keyphrases
- identity management
- cloud computing
- access control
- security mechanisms
- security issues
- data security
- data center
- data management
- data privacy
- security requirements
- distributed computing
- access control mechanism
- service providers
- security model
- security policies
- databases
- personal information
- role based access control
- trust relationships
- third party
- mobile devices