Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud
暂无分享,去创建一个
[1] Indrajit Ray,et al. An interoperable context sensitive model of trust , 2009, Journal of Intelligent Information Systems.
[2] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[4] Khaled Riad,et al. Multi-authority trust access control for cloud storage , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).
[5] Rohitash Kumar Banyal,et al. Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.
[6] Zhu Yan,et al. EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing , 2015 .
[7] Elisa Bertino,et al. A Flexible Approach to Multisession Trust Negotiations , 2012, IEEE Transactions on Dependable and Secure Computing.
[8] Khaled Riad,et al. Revocation basis and proofs access control for cloud storage multi-authority systems , 2016, 2016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR).
[9] Meina Song,et al. The design of a trust and role based access control model in cloud computing , 2011, 2011 6th International Conference on Pervasive Computing and Applications.
[10] Wei-Tek Tsai,et al. Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.
[11] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[12] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[13] Dengguo Feng,et al. Towards Attribute Revocation in Key-Policy Attribute Based Encryption , 2011, CANS.
[14] Min Lei,et al. MTBAC: A mutual trust based access control model in Cloud computing , 2014, China Communications.
[15] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[16] Elisa Bertino,et al. Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment , 2004, IEEE Transactions on Knowledge and Data Engineering.
[17] Khaled Riad. Blacklisting and Forgiving Coarse-grained Access Control for Cloud Computing , 2016 .
[18] Indrajit Ray,et al. Trust-Based Access Control for Secure Cloud Computing , 2014 .
[19] Michel Riguidel,et al. Adjustable Trust Model for Access Control , 2008, ATC.
[20] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[21] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[22] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.
[23] Daan Broeder,et al. A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.