CC Lee, PS Chung,
MS Hwang - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
… environments. Finally, we list the comparisons of these schemes by some criteria for cloud
environments. Keywords: Cloud computing, attribute-based encryption, access control, fine-…