Login / Signup

A P2P based usage control enforcement scheme resilient to re-injection attacks.

Iraklis LeontiadisRefik MolvaMelek Önen
Published in: WoWMoM (2014)
Keyphrases
  • usage control
  • access control
  • injection attacks
  • peer to peer
  • information systems
  • social networks
  • distributed systems
  • data sharing