Actions
NAC-ABE Design¶

Why KP-ABE
Data encryption → CK encryption → CK decryption
ABE encryption of CK (black box)
ABE key issuance (DKEY)
CK granularity (second/minute/hour)
Tradeoffs of CK reuse level


Updated by Suravi Regmi about 14 hours ago · 2 revisions