Login / Signup

Role based access control using identity and broadcast based encryption for securing cloud data.

Urvashi Rahul SaxenaTaj Alam
Published in: J. Comput. Virol. Hacking Tech. (2022)
Keyphrases
  • data sets
  • data points
  • data collection
  • database
  • data quality
  • distributed data
  • original data
  • access control
  • high dimensional data
  • information systems
  • data sources
  • end users
  • data warehouse
  • data distribution