Agent-Based Cloud Broker Architecture for Distributed Access Control
暂无分享,去创建一个
[1] Zhibin Wang,et al. Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[2] Clara Bertolissi,et al. An algebraic-functional framework for distributed access control , 2008, 2008 Third International Conference on Risks and Security of Internet and Systems.
[3] Alberto RibesAbstract,et al. Multi agent systems , 2019, Proceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005)..
[4] Anil L. Pereira. RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.
[5] Chang Nian Zhang,et al. Designing secure e-commerce with role-based access control , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[6] Weiping Shao,et al. An attribute and role based access control model for service-oriented environment , 2010, 2010 Chinese Control and Decision Conference.
[7] D. Bernstein,et al. An Intercloud Cloud Computing Economy - Technology, Governance, and Market Blueprints , 2011, 2011 Annual SRII Global Conference.
[8] D. Bernstein,et al. Intercloud Exchanges and Roots Topology and Trust Blueprint , 2011 .
[9] Danny B. Lange,et al. Dispatch Your Agents; Shut Off Your Machine , 1999 .
[10] Steven Diamond,et al. Blueprint for the Intercloud - Protocols and Formats for Cloud Computing Interoperability , 2009, 2009 Fourth International Conference on Internet and Web Applications and Services.
[11] Haicheng Xu,et al. A dynamic Access Control model based on trust , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.
[12] Gadadhar Sahoo,et al. Identity Management in Cloud Computing -A Review , 2012 .
[13] P. Venkataram,et al. Applications of agent technology in communications: a review , 2004, Comput. Commun..
[14] Thomas Magedanz,et al. Intelligent agents: an emerging technology for next generation telecommunications? , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.
[15] Rajkumar Buyya,et al. Cloudbus Toolkit for Market-Oriented Cloud Computing , 2009, CloudCom.
[16] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[17] Jordi Torres,et al. Characterizing Cloud Federation for Enhancing Providers' Profit , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[18] Joni da Silva Fraga,et al. Integral Federated Identity Management for Cloud Computing , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[19] V. Varadharajan,et al. Security Agent Based Distributed Authorization : An Approach , 1998 .
[20] Chang Nian Zhang,et al. An object-oriented RBAC model for distributed system , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.
[21] Antonio Puliafito,et al. Security and Cloud Computing: InterCloud Identity Management Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[22] Antonio Puliafito,et al. Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication , 2010, 2010 Second International Conference on Advances in Future Internet.
[23] Leon Gommans,et al. Domain Based Access Control Model for Distributed Collaborative Applications , 2006, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06).
[24] Byrav Ramamurthy,et al. Hierarchy-based access control in distributed environments , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[25] Junshan Li,et al. A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[26] David Bernstein,et al. Intercloud Directory and Exchange Protocol Detail Using XMPP and RDF , 2010, 2010 6th World Congress on Services.
[27] Bruno Crispo,et al. Towards Run-Time Verification in Access Control , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.
[28] Antonio Puliafito,et al. How CLEVER-based clouds conceive horizontal and vertical federations , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[29] Antonio Puliafito,et al. How to Enhance Cloud Architectures to Enable Cross-Federation , 2010, IEEE CLOUD.
[30] Rajkumar Buyya,et al. InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.
[31] David Bernstein,et al. Intercloud Security Considerations , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[32] Nick Antonopoulos,et al. Access control for agent-based computing: a distributed approach , 2001, Internet Res..
[33] Qiang Li,et al. Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[34] Chen Liu,et al. Analysis and Design of an Access Control Model Based on Credibility , 2009, 2009 International Conference on Computer Engineering and Technology.