A Semi-distributed Access Control Management Scheme for Securing Cloud Environment
暂无分享,去创建一个
[1] Abdul Raouf Khan,et al. ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT , 2012 .
[2] G. Geetha Kumari,et al. API access control in cloud using the Role Based Access Control Model , 2010, Trendz in Information Sciences & Computing(TISC2010).
[3] Vasudeva Varma,et al. Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.
[4] Manoj V. Thomas,et al. Agent-based approach for distributed access control in cloud environments , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[5] David W. Chadwick,et al. Adding Federated Identity Management to OpenStack , 2013, Journal of Grid Computing.
[6] K Punithasurya,et al. Analysis of Different Access Control Mechanism in Cloud , 2012 .
[7] Walid G. Aref,et al. A Distributed Access Control Architecture for Cloud Computing , 2012, IEEE Software.
[8] Carla Merkle Westphall,et al. A dynamic risk-based access control architecture for cloud computing , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[9] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[10] Wei Li,et al. A Refined RBAC Model for Cloud Computing , 2012, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science.
[11] Valentin Cristea,et al. Secure Access to Cloud Resources , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[12] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[13] Stefan Berger,et al. Security for the cloud infrastructure: Trusted virtual data center implementation , 2009, IBM J. Res. Dev..
[14] Kenli Li,et al. A New RBAC Based Access Control Model for Cloud Computing , 2012, GPC.
[15] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[16] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.
[17] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.