A survey on access control mechanisms for cloud computing

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[2]  Xiaohui Liang,et al.  Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.

[3]  Enas F. Rawashdeh,et al.  Trust models for services in cloud environment: A survey , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).

[4]  Suziah Sulaiman,et al.  A study on threat model for federated identities in federated identity management system , 2010, 2010 International Symposium on Information Technology.

[5]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[6]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[7]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[8]  M. Aramudhan,et al.  Survey on access control issues in cloud computing , 2016, 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS).

[9]  Xiang-Yang Li,et al.  Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2015, IEEE Trans. Inf. Forensics Secur..

[10]  Athanasios V. Vasilakos,et al.  Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.

[11]  Muhammad Awais Shibli,et al.  Evaluation and establishment of trust in cloud federation , 2014, ICUIMC '14.

[12]  Mário J. Silva,et al.  Group-based Discretionary Access Control for Epidemiological Resources , 2013 .

[13]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[14]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[15]  Tai-Hoon Kim,et al.  Extensions to ciphertext-policy attribute-based encryption to support distributed environments , 2013, Int. J. Comput. Appl. Technol..

[16]  Fuchun Guo,et al.  Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing , 2018, Future Gener. Comput. Syst..

[17]  Richard Boateng,et al.  Cloud computing research: A review of research themes, frameworks, methods and future research directions , 2018, Int. J. Inf. Manag..

[18]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[19]  Emmanouil Magkos,et al.  T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[20]  Suriyani Ariffin,et al.  Big Data Security in the Web-Based Cloud Storage System Using 3D-AES Block Cipher Cryptography Algorithm , 2018 .

[21]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[22]  He Wang,et al.  Delegation in the role graph model , 2006, SACMAT '06.

[23]  David W. Chadwick,et al.  The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management , 2013, 2013 International Conference on Availability, Reliability and Security.

[24]  Félix Gómez Mármol,et al.  TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.

[25]  Robert H. Deng,et al.  An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited , 2018, Comput. Networks.

[26]  Carlos E. Rubio-Medrano,et al.  Supporting secure collaborations with attribute-based access control , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[27]  Jie Wu,et al.  Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.

[28]  Edward J. Coyne,et al.  ABAC and RBAC: Scalable, Flexible, and Auditable Access Management , 2013, IT Professional.

[29]  Joseph K. Liu,et al.  Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Florian Kerschbaum An access control model for mobile physical objects , 2010, SACMAT '10.

[31]  Fan Hong,et al.  An Attribute-Based Access Control Model for Web Services , 2006, PDCAT.

[32]  Zahir Tari,et al.  Hybrid Cryptographic Access Control for Cloud-Based EHR Systems , 2016, IEEE Cloud Computing.

[33]  Fang Liu,et al.  NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.

[34]  Yingjiu Li,et al.  An attribute-based access matrix model , 2005, SAC '05.

[35]  Rakesh Bobba,et al.  Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption , 2009, ESORICS.

[36]  Rajiv Ranjan,et al.  Trustworthy Processing of Healthcare Big Data in Hybrid Clouds , 2015, IEEE Cloud Computing.

[37]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[38]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[39]  He Wang,et al.  Static and Dynamic Delegation in the Role Graph Model , 2011, IEEE Transactions on Knowledge and Data Engineering.

[40]  Fred B. Schneider,et al.  Federated Identity Management Systems: A Privacy-Based Characterization , 2013, IEEE Security & Privacy.

[41]  Kai Zhao,et al.  Towards an Approach of Semantic Access Control for Cloud Computing , 2009, CloudCom.

[42]  Zhen Liu,et al.  Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.

[43]  Bo Lang,et al.  Attribute-Based Access Control for Layered Grid Resources , 2010, FGIT-FGCN.

[44]  Gail-Joon Ahn,et al.  Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.

[45]  Haibo Shen A Semantic-Aware Attribute-Based Access Control Model for Web Services , 2009, ICA3PP.

[46]  Ramin Yahyapour,et al.  An effective user revocation for policy-based access control schema in clouds , 2017, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet).

[47]  Pinki Roy,et al.  Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..

[48]  Xiaolei Dong,et al.  Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[49]  Jiguo Li,et al.  Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..

[50]  AlamMasoom,et al.  A survey of cloud computing data integrity schemes , 2017 .

[51]  Walid G. Aref,et al.  A Distributed Access Control Architecture for Cloud Computing , 2012, IEEE Software.

[52]  Cheng-Chi Lee,et al.  A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..

[53]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[54]  Mojtaba Alizadeh,et al.  Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..

[55]  Shilong Ma,et al.  A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems , 2012, J. Networks.

[56]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[57]  Robert H. Deng,et al.  HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.

[58]  Patrice Clemente,et al.  An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system , 2014, Future Gener. Comput. Syst..

[59]  Sushil Jajodia,et al.  A logic-based framework for attribute based access control , 2004, FMSE '04.

[60]  Daniel J. Buehrer,et al.  CA-ABAC: Class Algebra Attribute-Based Access Control , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[61]  Pieter H. Hartel,et al.  Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.

[62]  Vivy Suhendra A Survey on Access Control Deployment , 2011, FGIT-SecTech.

[63]  Vijayalakshmi Atluri,et al.  The Policy Machine: A novel architecture and framework for access control policy specification and enforcement , 2011, J. Syst. Archit..

[64]  Yi Mu,et al.  Dynamic Trust Model for Federated Identity Management , 2010, 2010 Fourth International Conference on Network and System Security.

[65]  Sanjay Kumar Madria,et al.  ETIS -- Efficient Trust and Identity Management System for Federated Service Providers , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[66]  John Hughes,et al.  Security Assertion Markup Language (SAML) 2.0 Technical Overview , 2004 .

[67]  Zhen Ji,et al.  Secure interoperation of identity managements among different circles of trust , 2011, Comput. Stand. Interfaces.

[68]  E. Samlinson,et al.  User-centric trust based identity as a service for federated cloud environment , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[69]  Pieter H. Hartel,et al.  Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes , 2008, ISPEC.

[70]  Ravi S. Sandhu,et al.  PBDM: a flexible delegation model in RBAC , 2003, SACMAT '03.

[71]  R. M. Alguliev,et al.  Identity management based security architecture of cloud computing on multi-agent systems , 2013, Third International Conference on Innovative Computing Technology (INTECH 2013).

[72]  Xin Wang,et al.  A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing , 2017, Sensors.

[73]  Jingsha He,et al.  Survey of access control models and technologies for cloud computing , 2018, Cluster Computing.

[74]  Lei Wu,et al.  Attribute-Based Access Control Security Model in Service-Oriented Computing , 2014 .

[75]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[76]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.

[77]  Linlan Liu,et al.  Study on Action and Attribute-Based Access Control Model for Web Services , 2009, 2009 Second International Symposium on Information Science and Engineering.

[78]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[79]  Adeel Anjum,et al.  A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..

[80]  David W. Chadwick,et al.  CardSpace in the cloud , 2010, CCS '10.

[81]  Sylvia L. Osborn,et al.  HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control , 2014, FPS.

[82]  R.W. Baldwin,et al.  Naming and grouping privileges to simplify security management in large databases , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.