Login / Signup
Role based access control using identity and broadcast based encryption for securing cloud data.
Urvashi Rahul Saxena
Taj Alam
Published in:
J. Comput. Virol. Hacking Tech. (2022)
Keyphrases
</>
data sets
data points
data collection
database
data quality
distributed data
original data
access control
high dimensional data
information systems
data sources
end users
data warehouse
data distribution