Access Control Strategy Based on Trust under Cloud Computing Platform
暂无分享,去创建一个
[1] Min Lei,et al. MTBAC: A mutual trust based access control model in Cloud computing , 2014, China Communications.
[2] Xuejiao Liu,et al. Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Ali Mamat,et al. TC-enabled and distributed cloud computing access control model , 2014 .
[4] RajaniKanth Aluvalu,et al. A Survey on Access Control Models in Cloud Computing , 2015 .
[5] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[6] Yong Sheng Zhang,et al. Design of Trust Model Based on Behavior in Cloud Computing Environment , 2014 .
[7] Liu Yang,et al. Research on trust-based access control model in cloud computing , 2011, 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference.
[8] Bo Li,et al. Strategy of Domain and Cross-Domain Access Control Based on Trust in Cloud Computing Environment , 2014 .
[9] Xuefeng Zheng,et al. TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing , 2013, ArXiv.