What is it about?
This article presents a solid and comprehensive survey of ABE in the setting of cloud computing access control.
Featured Image
Photo by Daniel Páscoa on Unsplash
Why is it important?
A clear taxonomy and comprehensive assessment criteria of ABE are proposed. Besides, a systematical methodology for discussing and comparing existing ABE schemes is proposed.
Perspectives
Read the Original
This page is a summary of: Attribute-based Encryption for Cloud Computing Access Control, ACM Computing Surveys, July 2021, ACM (Association for Computing Machinery),
DOI: 10.1145/3398036.
You can read the full text:
Contributors
The following have contributed to this page