Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption
Naîma Meddah; Ahmed Toumanari
International Journal of Cloud Computing (IJCC), 2016 Vol.5 No.3, pp.187 - 197
3 - 11 =

Thank you for your feedback.