Contract RBAC in cloud computing
暂无分享,去创建一个
[1] Yong Zhang,et al. Cognitive access control in cognitive heterogeneous networks , 2009, 2009 IEEE International Conference on Communications Technology and Applications.
[2] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[3] Wei Li,et al. A Refined RBAC Model for Cloud Computing , 2012, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science.
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Shiuh-Jeng Wang,et al. Temporal and Location-Based RBAC Model , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[6] Stephen S. Yau,et al. Software Engineering Meets Services and Cloud Computing , 2011, Computer.
[7] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[8] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[9] Rakesh Gupta. Above the Clouds: A View of Cloud Computing , 2012 .
[10] M. Zaharia,et al. Above the Clouds : A View of Cloud Computing , 2009 .
[11] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[12] Hsing-Chung Chen,et al. A cognitive RBAC model with handover functions in small heterogeneous networks , 2013, Math. Comput. Model..
[13] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[14] Meina Song,et al. The design of a trust and role based access control model in cloud computing , 2011, 2011 6th International Conference on Pervasive Computing and Applications.
[15] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[16] Guillermo Navarro-Arribas,et al. Intra-role Progression in RBAC: An RPG-Like Access Control Scheme , 2011, DPM/SETOP.