Amanote Research

Amanote Research

    RegisterSign In

Cloud Based Access Control Model for Selective Encryption of Documents With Traitor Detection

International Journal of Network Security & Its Applications
doi 10.5121/ijnsa.2014.6502
Full Text
Open PDF
Abstract

Available in full text

Date

September 30, 2014

Authors
Punya PeethambaranJayasudha J. S
Publisher

Academy and Industry Research Collaboration Center (AIRCC)


Related search

Data Encryption Using SCT and Access Control Using TRBAC in Cloud Computing for Big Data

International Journal of Advanced Networking Applications
2019English

Research on Access Control Model Based on User Action in Cloud Computing

2016English

Providing Ontology-Based Access Control for Cloud Data by Exploiting Subsumption Property Among Domains of Access Control

International Journal of Intelligent Engineering and Systems
EngineeringComputer Science
2019English

Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication

International Journal of Science and Research (IJSR)
2015English

TC-enabled and Distributed Cloud Computing Access Control Model

Journal of Applied Sciences
2014English

Big Data Security With Access Control Model and Honeypot in Cloud Computing

International Journal of Computer Applications
2019English

Short Hierarchical Identity-Based Encryption in the Selective-Id Model

Journal of Software
2013English

Applying Hierarchical and Role-Based Access Control to XML Documents

2004English

An Access Control Model for Location Based Services

2008English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy