ACaaS: Access Control as a Service for IaaS Cloud
暂无分享,去创建一个
[1] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[2] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[3] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[4] Dongwan Shin,et al. Permission Management System: Permission as a Service in Cloud Computing , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[5] Xinwen Zhang,et al. CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services , 2011, SecureComm.
[6] Yonggang Wen,et al. Towards end-to-end secure content storage and delivery with public cloud , 2012, CODASPY '12.
[7] Jose M. Alcaraz Calero,et al. Toward a Multi-Tenancy Authorization System for Cloud Services , 2010, IEEE Security & Privacy.
[8] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[9] Kai Zhao,et al. Towards an Approach of Semantic Access Control for Cloud Computing , 2009, CloudCom.