Search Results - (( java implication bees algorithm ) OR ( policy implementation force algorithm ))

  • Showing 1 - 1 results of 1
Refine Results
  1. 1

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
    Get full text
    Get full text
    Thesis