Login / Signup
Research on key techniques of cryptographic access control and properties optimisation in cloud storage.
Shidong Zhu
Liu Jiang
Zhenliu Zhou
Published in:
Int. J. Inf. Technol. Manag. (2018)
Keyphrases
</>
access control
protection schemes
cloud storage
dynamic access control
data security
security policies
role based access control
security mechanisms
access control policies
cloud computing
distributed computing
security requirements
database
conflict resolution