![]() |
Volumn 3, Issue 3, 2011, Pages 163-168
|
A threshold-based model for privacy protection in cloud computing
|
Author keywords
(n+1, t+1) threshold scheme; Authorization; Cloud computing; Key matrix; Privacy; Role based access control; Vector
|
Indexed keywords
AUTHORIZATION;
KEY MATRIX;
PRIVACY;
ROLE-BASED ACCESS CONTROL;
THRESHOLD SCHEMES;
ACCESS CONTROL;
COMPUTER SYSTEMS;
MATRIX ALGEBRA;
VECTORS;
CLOUD COMPUTING;
|
EID: 79956221435
PISSN: 19763700
EISSN: None
Source Type: Journal
DOI: 10.4156/aiss.vol3.issue3.20 Document Type: Article |
Times cited : (8)
|
References (10)
|