Research Article

A Distributed Access Control with Outsourced Computation in Fog Computing

Figure 6

Access control structure of the user (x-out-of-n).