Cargando…

Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based sig...

Descripción completa

Detalles Bibliográficos
Autores principales: Xu, Qian, Tan, Chengxiang, Fan, Zhijie, Zhu, Wenye, Xiao, Ya, Cheng, Fujia
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5982144/
https://www.ncbi.nlm.nih.gov/pubmed/29772840
http://dx.doi.org/10.3390/s18051609