Login / Signup
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Hui Lin
Li Xu
Xinyi Huang
Wei Wu
Yijie Huang
Published in:
Ad Hoc Networks (2015)
Keyphrases
</>
access control
cloud computing
dynamic access control
mechanism design
management system
data center
identity management