Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud

Providing a creditable basis for access control decision-making is not an easy task for the resource pooling, dynamic, and multi-tenant cloud environment. The trust notation can provide this credit...

[1]  Indrajit Ray,et al.  An interoperable context sensitive model of trust , 2009, Journal of Intelligent Information Systems.

[2]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[3]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[4]  Khaled Riad,et al.  Multi-authority trust access control for cloud storage , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).

[5]  Rohitash Kumar Banyal,et al.  Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.

[6]  Zhu Yan,et al.  EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing , 2015 .

[7]  Elisa Bertino,et al.  A Flexible Approach to Multisession Trust Negotiations , 2012, IEEE Transactions on Dependable and Secure Computing.

[8]  Khaled Riad,et al.  Revocation basis and proofs access control for cloud storage multi-authority systems , 2016, 2016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR).

[9]  Meina Song,et al.  The design of a trust and role based access control model in cloud computing , 2011, 2011 6th International Conference on Pervasive Computing and Applications.

[10]  Wei-Tek Tsai,et al.  Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.

[11]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.

[12]  Ninghui Li,et al.  Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[13]  Dengguo Feng,et al.  Towards Attribute Revocation in Key-Policy Attribute Based Encryption , 2011, CANS.

[14]  Min Lei,et al.  MTBAC: A mutual trust based access control model in Cloud computing , 2014, China Communications.

[15]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[16]  Elisa Bertino,et al.  Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment , 2004, IEEE Transactions on Knowledge and Data Engineering.

[17]  Khaled Riad Blacklisting and Forgiving Coarse-grained Access Control for Cloud Computing , 2016 .

[18]  Indrajit Ray,et al.  Trust-Based Access Control for Secure Cloud Computing , 2014 .

[19]  Michel Riguidel,et al.  Adjustable Trust Model for Access Control , 2008, ATC.

[20]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[21]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[22]  Indrajit Ray,et al.  TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.

[23]  Daan Broeder,et al.  A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.