Search
Now showing items 1-1 of 1
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which ensures that only authorized users are given access to certain resources
or tasks. In ...