Research on trust-based access control model in cloud computing
暂无分享,去创建一个
Liu Yang | Renfa Li | Zhuo Tang | Ahmed Sallam | Zhanjiang Tan | Renfa Li | Ahmed Sallam | Zhuo Tang | Liu Yang | Zhanjiang Tan
[1] Andrew S. Patrick,et al. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.
[2] Tibor Jager,et al. A Browser-Based Kerberos Authentication Scheme , 2008, ESORICS.
[3] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[4] Tim Mather,et al. Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.
[5] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[6] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[7] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[8] Joon S. Park,et al. Role-based access control for collaborative enterprise in peer-to-peer computing environments , 2003, SACMAT '03.
[9] Ninghui Li,et al. Security analysis in role-based access control , 2004, SACMAT '04.
[10] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[11] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[12] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[13] Walt Yao,et al. Fidelis: A Policy-Driven Trust Management Framework , 2003, iTrust.
[14] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[15] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[16] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[17] Young-Koo Lee,et al. A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[18] Kenli Li,et al. Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk , 2010, ISPEC.
[19] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[20] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.
[21] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[22] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[23] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.