Research Article

Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control

Figure 7

The average efficiency comparison proposed protocol with trust-based and role-based access control mechanisms.