Sign in

How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.

E. ChenYan ZhuGuizhen ZhuKaitai LiangRongquan Feng
Published in: Comput. Secur. (2021)
Keyphrases
  • file sharing
  • peer to peer
  • peer to peer networks
  • small number
  • optimal policy
  • attribute values
  • virtual machine
  • cloud computing
  • metadata
  • client server
  • key management
  • security analysis
  • video on demand
  • private cloud