Efficient oblivious transfers with access control.
Jinguang HanWilly SusiloYi MuJun YanPublished in: Comput. Math. Appl. (2012)
Keyphrases
- access control
- fine grained
- security policies
- dynamic access control
- data security
- security model
- security mechanisms
- role based access control
- access control models
- access control systems
- identity management
- access control policies
- databases
- data protection
- access control mechanism
- unauthorized access
- rbac model
- information systems