CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
Yi-Ruei ChenCheng-Kang ChuWen-Guey TzengJianying ZhouPublished in: ACNS (2013)
Keyphrases
- cloud computing
- access control
- identity management
- fine grained
- data center
- protection schemes
- service providers
- security policies
- role based access control
- data management
- distributed computing
- security issues
- security mechanisms
- smart card
- access control policies
- data privacy
- computing platform
- security requirements
- computer systems