Prasanthi, K. V.L, M Tech (S.E), Dept of IT, Gokaraju Rangaraju Institute of Engineering and Technology, India
-
Vol 2, No 8 (2015): VOL-2_ISSUE-08_August_2015 - Research Articles
Access control using k-anonymity on Sensitive Information by query evaluation unauthorized users outsourced database (ACM) Role-predicated access control (PPM)
Abstract PDF
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org