Analysis of Security-Based Access Control Models for Cloud Computing
暂无分享,去创建一个
[1] Kouichi Sakurai,et al. A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing , 2017, Comput. Electr. Eng..
[2] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[3] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[4] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[5] Rizwan Patan,et al. Security, Privacy, Trust, and Anonymity , 2018, Advances of DNA Computing in Cryptography.
[6] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Lili Sun,et al. A purpose based usage access control model , 2010 .
[8] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[9] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[10] Cynthia E. Irvine,et al. A cloud-oriented cross-domain security architecture , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[11] Pierre Riteau. Building Dynamic Computing Infrastructures over Distributed Clouds , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.
[12] Javier López,et al. Access control for cyber-physical systems interconnected to the cloud , 2018, Comput. Networks.
[13] Chittaranjan Hota,et al. Capability-based Cryptographic Data Access Control in Cloud Computing , 2011 .
[14] Luigi Coppolino,et al. Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..
[15] Danwei Chen,et al. Access Control of Cloud Service Based on UCON , 2009, CloudCom.
[16] Seog Park,et al. Task-role-based access control model , 2003, Inf. Syst..
[17] O. KuyoroS.. Cloud Computing Security Issues and Challenges , 2011 .