Login / Signup
How to use attribute-based encryption to implement role-based access control in the cloud.
Yan Zhu
Di Ma
Changjun Hu
Dijiang Huang
Published in:
SCC@ASIACCS (2013)
Keyphrases
</>
role based access control
access control
multi domain
cloud computing
data security
security policies
security model
fine grained
access control policies
cross domain
security mechanisms