End-to-end policy based encryption techniques for multi-party data management.
Autor: | Beiter, Michael1 Michael.Beiter@hp.com, Casassa Mont, Marco2 Marco.Casassa-Mont@hp.com, Chen, Liqun2 Liqun.Chen@hp.com, Pearson, Siani2 Siani.Pearson@hp.com |
---|---|
Zdroj: | Computer Standards & Interfaces. Jun2014, Vol. 36 Issue 4, p689-703. 15p. |
Databáze: | Academic Search Ultimate |
Externí odkaz: |