An efficient traceable access control scheme with reliable key delegation in mobile cloud computing.
Zhitao GuanJing LiYing ZhangRuzhi XuZhuxiao WangTingting YangPublished in: EURASIP J. Wirel. Commun. Netw. (2016)
Keyphrases
- cloud computing
- control scheme
- internet services
- network access
- closed loop
- computing resources
- access control
- middleware architecture
- control system
- data center
- cloud computing environment
- distributed computing
- dynamic model
- control strategy
- big data
- computing technologies
- control loop
- business models
- cloud storage
- mobile phone
- identity management
- data management
- service providers
- cloud computing platform
- data mining
- mobile computing
- mobile devices
- internet access
- service level agreements
- computing platform
- mobile services
- mobile applications
- mobile learning
- cloud platform
- web services