• No results found

Robust access control framework for mobile cloud computing network

N/A
N/A
Protected

Academic year: 2019

Share "Robust access control framework for mobile cloud computing network"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 1: Comparison of Related Works. The proposed work incorporate support more dynamic attributes than other works.
Figure 2: Proposed algorithm’s architecture at high level.
Figure 5: Computational complexity comparison for single authority case.
Table 4: Comparison of computational cost for the MA-ABE scheme and theproposed scheme.
+3

References

Related documents

2008) focus on the specifics in transition economies; they stress the important role that agricultural development still has for poverty reduction in rural areas of transition

The glass mats with and without binder show different surface topography due to the binder deposition. The binder appears to be present at cross points between fibers as well as along

Secondly, the voting process which will be done by ciphering the voter information using public-key encryption cryptosystem (RSA), to be submitted over an insecure network to

This study was undertaken to evaluate in vitro the inhibitory activity of aqueous extractof five selected plants used in Algeria to treat diabetes, against -amylase a key

(E1) Control disks with ethanol; (W1) Control disks with distilled water; (E2) ethanolic extract disks containing 10mg saponin; (W2) aqueous extract disks containing 10mg

Even in cases where the use of cloud-based services is considered to fall under the scope of data protection laws, encryption and tokenization solutions as offered by CipherCloud

From “gentlemen” and “heroes” to “real men” and “disabled men,” this article identifies dominant historical and contemporary images of masculinity and

The presence of endophytes in the food plant of the aphid hosts significantly increased the larval and pupal development time of parasitoids.. Unexpectedly, all other measured