Return to Article Details Entrustment of Access Control in Public Clouds Download Download PDF