Research Article
Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control
| Subject | Object | File 1 | File 2 | File 3 |
| User 1 | Write, read, execute | Read | Write | User 2 | Read | Write, read, execute | Read | User 3 | Read | Write, read, execute | Write, read, execute |
|
|