Login / Signup
Enforcing Access Control Policies over Data Stored on Untrusted Server.
Naeimeh Soltani
Rasool Jalili
Published in:
ISCISC (2017)
Keyphrases
</>
database
data sets
raw data
data sources
data collection
data processing
computer systems
data model
data privacy