Return to Article Details User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment. Download Download PDF