What is it about?
This article presents a solid and comprehensive survey of ABE in the setting of cloud computing access control.
Featured Image
Photo by Daniel Páscoa on Unsplash
Why is it important?
A clear taxonomy and comprehensive assessment criteria of ABE are proposed. Besides, a systematical methodology for discussing and comparing existing ABE schemes is proposed.
Perspectives
Completing this survey is very challenging. I hope this article helps practitioners to determine suitable ABE schemes and inspires researchers to explore customized ABE designs for particular cloud computing access control scenarios.
Yinghui Zhang
Read the Original
This page is a summary of: Attribute-based Encryption for Cloud Computing Access Control, ACM Computing Surveys, July 2021, ACM (Association for Computing Machinery), DOI: 10.1145/3398036.
You can read the full text:
Contributors
The following have contributed to this page