Access Control Encryption from Group Encryption.
Xiuhua WangHarry W. H. WongSherman S. M. ChowPublished in: ACNS (1) (2021)
Keyphrases
- access control
- data protection
- digital rights management
- fine grained
- data security
- dynamic access control
- security policies
- encryption scheme
- access control models
- security requirements
- role assignment
- data encryption
- role based access control
- encryption algorithm
- security model
- security analysis
- access control policies
- secret key
- protection schemes
- data model
- network security
- identity management
- database management systems
- security mechanisms
- role based access control model
- domain specific