Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation IJTSRD
The purpose of this paper is to study of access control scheme to protect users privacy in cloud environment is of great significance. In this paper, we present an access control system with privilege separation based on privacy protection. In the PS-ACS scheme, we divide the users into personal domain and public domain logically. In […]