Login / Signup
An End-To-End Encrypted Cache System with Time-Dependent Access Control.
Keita Emura
Masato Yoshimi
Published in:
CoRR (2023)
Keyphrases
</>
end to end
access control
data security
dynamic access control
security policies
multipath
security requirements
role based access control
access control mechanism
query processing
ad hoc networks
congestion control
data access
access control policies
access control models