Login / Signup
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud.
Gaurav Pareek
B. R. Purushothama
Published in:
ICISS (2018)
Keyphrases
</>
access control
fine grained
access control policies
database
data collection
data protection
security requirements
data security
unauthorized access
security mechanisms
data quality
policy enforcement
access control models
access control systems
role based access control
security policies
databases