|
|
|
Vangelis Malamas, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester and Dimitris Glynos
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Yun Zhang and Enzhong Xu
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Dat...
ver más
|
|
|
|
|
|
|
Balaji Chandrasekaran,Yasuyuki Nogami,Ramadoss Balakrishnan
Pág. 151 - 156
In cloud environment, profile matching is a key technique in applications such as health care and social networks. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable technique for data sharing in such environments. In this paper, we propos...
ver más
|
|
|
|