Login / Signup
Access Control Aware Search on the Cloud Computing.
Abdellah Kaci
Thouraya Bouabana-Tebibel
Zakia Challal
Published in:
ICACCI (2014)
Keyphrases
</>
access control
cloud computing
identity management
data center
security issues
security mechanisms
security policies
fine grained
service providers
data management
distributed computing
access control policies
role based access control
security requirements
information security
data privacy
databases