Font Size: a A A
Keyword [Access Control Policies]
Result: 21 - 22 | Page: 2 of 2
21. Verifiable delegated computation on outsourced data
22. Research On The Synthesis Mechanism Of Cross-domain Access Control Policies In Cloud Computing Environment
  <<First  <Prev  Next>  Last>>  Jump to