Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Approach of Implementing Core Role Based Access Control Model Using Attribute Based Encryption

    Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is se...

    Yong Wang, Xuemin Tong, Ming Li, **gfeng Xue in Trusted Computing and Information Security (2017)