Quantum technique for access control in cloud computing II: Encryption and key distribution.
Lu ZhouQuanlong WangXin SunPiotr KulickiArcangelo CastiglionePublished in: J. Netw. Comput. Appl. (2018)
Keyphrases
- cloud computing
- access control
- key distribution
- key management
- secret key
- identity management
- data center
- security mechanisms
- data security
- ad hoc networks
- data protection
- distributed computing
- service providers
- smart card
- resource constrained
- fault tolerant
- data management
- security policies
- security issues
- data privacy
- wireless sensor networks
- public key
- elliptic curve
- access control policies
- encryption scheme
- security requirements
- signature scheme
- end to end
- security protocols
- ciphertext
- security analysis
- low cost
- database