Login / Signup

Enforcing Access Control Policies over Data Stored on Untrusted Server.

Naeimeh SoltaniRasool Jalili
Published in: ISCISC (2017)
Keyphrases
  • database
  • data sets
  • raw data
  • data sources
  • data collection
  • data processing
  • computer systems
  • data model
  • data privacy