News
Various credential based approaches have been proposed for realizing access control on shared data sources. These approaches use various types of credentials like identity certificates, attribute ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results