Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Yinghui ZhangJin LiXiaofeng ChenHui LiPublished in: Secur. Commun. Networks (2016)
Keyphrases
- database management systems
- cloud computing
- access control
- data management
- security model
- database applications
- ciphertext
- data access
- identity management
- security policies
- database
- distributed computing
- service providers
- public key
- access control policies
- standard model
- peer to peer
- security mechanisms
- computing platform
- security issues
- security requirements
- encryption scheme
- secret key