Skip to main navigation
Skip to search
Skip to main content
University of Twente Research Information Home
Home
Profiles
Research units
Projects
Research output
Datasets
Activities
Prizes
Press/Media
Search by expertise, name or affiliation
Cryptographically Enforced Distributed Data Access Control
L. Ibraimi
Databases (Former)
Research output
:
Thesis
›
PhD Thesis - Research UT, graduation UT
507
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Cryptographically Enforced Distributed Data Access Control'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Access Control
18%
Access Control Policies
72%
Attribute-Based Encryption
45%
Authorized User
9%
Ciphertext
63%
Compromised User
9%
Control
18%
Credentials
18%
Cryptographic Primitive
18%
Data Access Control
100%
Decryption
27%
encryption key
18%
Encryption Scheme
45%
Encryption Technique
9%
Grained Access Control
9%
Hackers
9%
Information Storage
9%
Malware
9%
Messages
9%
Outsourced Data
9%
Outsourcing
9%
proxy re encryption
27%
public-key encryption
18%
Server
100%
User
63%
User Data
18%