A User-Centric Access Control Framework for Cloud Computing
暂无分享,去创建一个
[1] Krishna M. Sivalingam,et al. Security and privacy in the Internet of Things , 2016 .
[2] Towards a definition of the Internet of Things ( IoT ) , 2015 .
[3] Mike Surridge,et al. Towards a Model of User-centered Privacy Preservation , 2017, ARES.
[4] Marimuthu Palaniswami,et al. Internet of Things (IoT): Definitions, Challenges and Recent Research Directions , 2015 .
[5] Michael Diener,et al. Tackling the Cloud Adoption Dilemma - A User Centric Concept to Control Cloud Migration Processes by Using Machine Learning Technologies , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[6] Fenareti Lampathaki,et al. Personal Cloudlets: Implementing a User-centric Datastore with Privacy Aware Access Control for Cloud-Based Data Platforms , 2015, 2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity.
[7] Mounira Msahli,et al. Towards a Fine-Grained Access Control for Cloud , 2014, 2014 IEEE 11th International Conference on e-Business Engineering.
[8] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[9] David M. Eyers,et al. Data-Centric Access Control for Cloud Computing , 2016, SACMAT.
[10] A. Crowell. A Survey of Access Control Policies , 2011 .
[11] Hannu Tenhunen,et al. An Approach for Smart Management of Big Data in the Fog Computing Context , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
[12] Karsten Brauer. Authentication and security aspects in an international multi-user network , 2011 .
[13] Leszek Lilien,et al. Protecting Privacy of Sensitive Data Dissemination Using Active Bundles , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
[14] Wenke Lee,et al. I Own, I Provide, I Decide: Generalized User-Centric Access Control Framework for Web Applications , 2010 .
[15] Juan Antonio Martínez,et al. User-centric access control for efficient security in smart cities , 2017, 2017 Global Internet of Things Summit (GIoTS).
[16] Roshanak Roshandel,et al. User-centric Monitoring of Sensitive Information Access in Android Applications , 2015, 2015 2nd ACM International Conference on Mobile Software Engineering and Systems.
[17] J. Iparraguirre. The Silver Economy , 2019, Economics and Ageing.