Sign in

How to use attribute-based encryption to implement role-based access control in the cloud.

Yan ZhuDi MaChangjun HuDijiang Huang
Published in: SCC@ASIACCS (2013)
Keyphrases
  • role based access control
  • access control
  • multi domain
  • cloud computing
  • data security
  • security policies
  • security model
  • fine grained
  • access control policies
  • cross domain
  • security mechanisms