Return to Article Details Different access control methods with revocationin multi-authority cloud Download Download PDF