Fig. 2From: An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computingThe system model of KP-ABS-UT in cloud computingBack to article page