Sign in

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.

Hui LinLi XuXinyi HuangWei WuYijie Huang
Published in: Ad Hoc Networks (2015)
Keyphrases
  • access control
  • cloud computing
  • dynamic access control
  • mechanism design
  • management system
  • data center
  • identity management