Author of the publication

Resource-centric Dynamic Access Control in Cloud.

, , , and . Trustcom/BigDataSE/ISPA, page 1957-1962. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT., , , , and . Inf. Sci., (2020)Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud., , , , and . ICC, page 1-6. IEEE, (2020)Federated Learning Scheme with Dual Security of Identity Authentication and Verification., , , and . TrustCom, page 695-702. IEEE, (2022)Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing., , , , , and . ICC, page 1-6. IEEE, (2018)Resource-centric Dynamic Access Control in Cloud., , , and . Trustcom/BigDataSE/ISPA, page 1957-1962. IEEE, (2016)A Reliable Supervision Model and Implementation for the Trading of Digital Works., , , and . CIS, page 484-488. IEEE Computer Society, (2014)SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning., , , , , and . CoRR, (2021)PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing., and . KSII Trans. Internet Inf. Syst., 13 (5): 2754-2767 (2019)SEDML: Securely and efficiently harnessing distributed knowledge in machine learning., , , , , and . Comput. Secur., (2022)DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication., , , , and . Soft Comput., 25 (11): 7325-7339 (2021)