MS Kirkpatrick, S Kerr - Proceedings of the first ACM conference on Data …, 2011 - dl.acm.org
In a distributed computing environment, remote devices must often be granted access to
sensitive information. In such settings, it is desirable to restrict access only to known, trusted …