Chrome Extension
WeChat Mini Program
Use on ChatGLM

Everything under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY(2023)

Cited 8|Views28
Key words
Access control,Encryption,Distributed databases,Security,Data processing,Data privacy,Servers,Cloud-edge computing,controllable delegation,bilateral access control,verifiability,WebAssembly
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined