Login / Signup
Verifiable computation with access control in cloud computing.
Lingling Xu
Shaohua Tang
Published in:
J. Supercomput. (2014)
Keyphrases
</>
access control
cloud computing
identity management
fine grained
data center
data management
distributed computing
security policies
security issues
service providers
security mechanisms
role based access control
security requirements
database
data privacy
database systems
data storage
access control policies