Research Article
Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control
| | Subject | Object | | File 1 | File 2 | File 3 |
| | User 1 | Write, read, execute | Read | Write | | User 2 | Read | Write, read, execute | Read | | User 3 | Read | Write, read, execute | Write, read, execute |
|
|