Fig. 1From: An efficient traceable access control scheme with reliable key delegation in mobile cloud computingSystem modelBack to article page