Literature Survey of Role Policy Access Using Cloud
暂无分享,去创建一个
S. Revathy | Santosh Krishna Naidu | Khan Afzal Ayub | S. Revathy | Santosh Krishna Naidu | Khan Afzal Ayub
[1] Dalit Naor,et al. Capability based Secure Access Control to Networked Storage Devices , 2007, 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007).
[2] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[3] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[4] Mahendra Pratap Singh. AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[5] Andrew S. Grimshaw,et al. LegionFS: A Secure and Scalable File System Supporting Cross-Domain High-Performance Applications , 2001, International Conference on Software Composition.
[6] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[7] Xin Chen,et al. An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.
[8] Martín Abadi,et al. Formal security analysis of basic network-attached storage , 2005, FMSE '05.
[9] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[10] Hui Li,et al. Owner Specified Excessive Access Control for Attribute Based Encryption , 2016, IEEE Access.
[11] B. Balamurugan,et al. An algebra for composing access control policies in cloud , 2015, International Confernce on Innovation Information in Computing Technologies.
[12] Arnon Rosenthal,et al. Methodological Review: Cloud computing: A new business paradigm for biomedical information sharing , 2010 .