Search Results - (( java implication tree algorithm ) OR ( policy implementation force algorithm ))*
Search alternatives:
- policy implementation »
- implementation force »
- java implication »
- implication tree »
- force algorithm »
- tree algorithm »
-
1
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
Get full text
Get full text
Thesis
