PpBAC: Popularity Based Access Control Model for Cloud Computing
暂无分享,去创建一个
[1] Ganesh Chandra Deka,et al. An Overview on the Virtualization Technology , 2014 .
[2] Saroj K. Biswas,et al. Redundancy-driven modified Tomek-link based undersampling: A solution to class imbalance , 2017, Pattern Recognit. Lett..
[3] Muthu Ramachandran,et al. Towards performance evaluation of cloud service providers for cloud data security , 2016, Int. J. Inf. Manag..
[4] Huang Xiuli,et al. Access Control of Cloud Service Based on UCON , 2009, CLOUD-II 2009.
[5] Pinki Roy,et al. A New Table Based Protocol for Data Accessing in Cloud Computing , 2017, J. Inf. Sci. Eng..
[6] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[7] S. Namasudra,et al. CLOUD COMPUTING: A NEW ERA , 2018 .
[8] Pinki Roy,et al. Cloud Computing: Fundamentals and Research Issues , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).
[9] M. Auxilia,et al. Ontology Centric Access Control Mechanism for Enabling Data Protection in Cloud , 2016 .
[10] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[11] Pinki Roy,et al. A new secure authentication scheme for cloud computing environment , 2017, Concurr. Comput. Pract. Exp..
[12] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[13] Gail-Joon Ahn,et al. Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.
[14] Jie Wu,et al. A connectivity-based popularity prediction approach for social networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[15] Pinki Roy,et al. Time saving protocol for data accessing in cloud computing , 2017, IET Commun..
[16] Abdul Raouf Khan,et al. ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT , 2012 .
[17] Min Lei,et al. MTBAC: A mutual trust based access control model in Cloud computing , 2014, China Communications.
[18] Jaya Jeswani,et al. Activity Based Access Control Model for Cloud Computing , 2015 .
[19] Pinki Roy,et al. Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..
[20] Abhishek Majumder,et al. Profile based access control model in cloud computing environment , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).
[21] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[22] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[23] Abhishek Majumder,et al. Taxonomy and Classification of Access Control Models for Cloud Environments , 2014 .
[24] Rui Jiang,et al. A Novel Data Access Scheme in Cloud Computing , 2012 .
[25] Pinki Roy,et al. Time efficient secure DNA based access control model for cloud computing environment , 2017, Future Gener. Comput. Syst..
[26] Muthu Ramachandran,et al. Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .
[27] Lili Sun,et al. A purpose based usage access control model , 2010 .