Font Size:
a
A
A
Keyword [Access Control Policies]
Result: 21 - 22 | Page: 2 of 2
21.
Verifiable delegated computation on outsourced data
22.
Research On The Synthesis Mechanism Of Cross-domain Access Control Policies In Cloud Computing Environment
<<First
<Prev
Next>
Last>>
Jump to