Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Zheng LianMang SuAnmin FuHuaqun WangChunyi ZhouPublished in: ICC (2020)
Keyphrases
- access control
- dynamic access control
- fine grained
- security policies
- data security
- role based access control
- access control models
- cloud computing
- unauthorized access
- security mechanisms
- security model
- database
- protection schemes
- access control systems
- security architecture
- rbac model
- role assignment
- identity management
- database security