This paper analyses the efficiency of user and resource-based hierarchies for read access control in cloud. It is shown that resourcebased hierarchies are more efficient than user-based hierarchies in terms of communication and computation costs, when considering dynamic operations such as extending read authorization and user revocation.
CITATION STYLE
Kumar, N., Mathuria, A., & Das, M. L. (2015). Comparing the efficiency of key management hierarchies for access control in cloud. In Communications in Computer and Information Science (Vol. 536, pp. 36–44). Springer Verlag. https://doi.org/10.1007/978-3-319-22915-7_4
Mendeley helps you to discover research relevant for your work.