Listar por tema "revocation"
Mostrando ítems 1-1 de 1
-
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 05/2024)Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. ...