Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud.
Naveen KumarAnish MathuriaManik Lal DasPublished in: SSCC (2015)
Keyphrases
- access control
- key management
- dynamic access control
- data security
- security mechanisms
- resource constrained
- ad hoc networks
- wireless sensor networks
- key distribution
- security policies
- security model
- access control policies
- cloud computing
- role based access control
- access control mechanism
- key management scheme
- security requirements
- access control models
- data streams
- lightweight