Search Results - (( java implication based algorithm ) OR ( policy implementation force algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1
  2. 2
  3. 3

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
    Get full text
    Get full text
    Thesis