What is it about?

This article presents a solid and comprehensive survey of ABE in the setting of cloud computing access control.

Featured Image

Why is it important?

A clear taxonomy and comprehensive assessment criteria of ABE are proposed. Besides, a systematical methodology for discussing and comparing existing ABE schemes is proposed.

Perspectives

Completing this survey is very challenging. I hope this article helps practitioners to determine suitable ABE schemes and inspires researchers to explore customized ABE designs for particular cloud computing access control scenarios.

Yinghui Zhang

Read the Original

This page is a summary of: Attribute-based Encryption for Cloud Computing Access Control, ACM Computing Surveys, July 2021, ACM (Association for Computing Machinery),
DOI: 10.1145/3398036.
You can read the full text:

Read

Contributors

The following have contributed to this page