ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
Muhammad Rizwan AsgharMihaela IonGiovanni RusselloBruno CrispoPublished in: CoRR (2013)
Keyphrases
- security policies
- access control
- ubiquitous computing environments
- distributed systems
- network security
- security requirements
- security management
- security concerns
- third party
- access control systems
- real world
- home network
- multilevel secure
- access control policies
- unauthorized access
- fine grained
- service providers
- operating system
- access control mechanism
- computer systems
- privacy preserving