A New RBAC Based Access Control Model for Cloud Computing
暂无分享,去创建一个
Kenli Li | Ruixuan Li | Juan Wei | Zhuo Tang | Ahmed Sallam | Kenli Li | Ahmed Sallam | Ruixuan Li | Zhuo Tang | Juan Wei
[1] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[2] Ninghui Li,et al. On mutually-exclusive roles and separation of duty , 2004, CCS '04.
[3] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[4] Mokdong Chung,et al. Adaptive security management model in the cloud computing environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[5] Sylvia L. Osborn,et al. Access Rights Administration in Role-Based Security Systems , 1994, DBSec.
[6] Ninghui Li,et al. Beyond proof-of-compliance: security analysis in trust management , 2005, JACM.
[7] Luigi V. Mancini,et al. Administrative scope in the graph-based framework , 2004, SACMAT '04.
[8] George Loizou,et al. Administrative scope: A foundation for role-based administrative models , 2003, TSEC.
[9] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[10] Dieter Gollmann,et al. Computer Security — ESORICS 2002 , 2002, Lecture Notes in Computer Science.
[11] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[12] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[13] Luigi V. Mancini,et al. Decidability of Safety in Graph-Based Models for Access Control , 2002, ESORICS.
[14] Tim Mather,et al. Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.
[15] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[16] Elisa Bertino,et al. Temporal hierarchies and inheritance semantics for GTRBAC , 2002, SACMAT '02.
[17] Chuang Lin,et al. Security Analysis of Maindatory Access Control Model , 2004 .