A survey on access control mechanisms for cloud computing
暂无分享,去创建一个
Jacques Demerjian | Jacques Bou Abdo | Rayane El Sibai | Jacques Demerjian | J. B. Abdo | Nader Gemayel | J. Demerjian | Nader M. Gemayel | R. E. Sibai
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[3] Enas F. Rawashdeh,et al. Trust models for services in cloud environment: A survey , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).
[4] Suziah Sulaiman,et al. A study on threat model for federated identities in federated identity management system , 2010, 2010 International Symposium on Information Technology.
[5] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[6] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[7] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[8] M. Aramudhan,et al. Survey on access control issues in cloud computing , 2016, 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS).
[9] Xiang-Yang Li,et al. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2015, IEEE Trans. Inf. Forensics Secur..
[10] Athanasios V. Vasilakos,et al. Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.
[11] Muhammad Awais Shibli,et al. Evaluation and establishment of trust in cloud federation , 2014, ICUIMC '14.
[12] Mário J. Silva,et al. Group-based Discretionary Access Control for Epidemiological Resources , 2013 .
[13] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[14] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[15] Tai-Hoon Kim,et al. Extensions to ciphertext-policy attribute-based encryption to support distributed environments , 2013, Int. J. Comput. Appl. Technol..
[16] Fuchun Guo,et al. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing , 2018, Future Gener. Comput. Syst..
[17] Richard Boateng,et al. Cloud computing research: A review of research themes, frameworks, methods and future research directions , 2018, Int. J. Inf. Manag..
[18] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[19] Emmanouil Magkos,et al. T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[20] Suriyani Ariffin,et al. Big Data Security in the Web-Based Cloud Storage System Using 3D-AES Block Cipher Cryptography Algorithm , 2018 .
[21] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[22] He Wang,et al. Delegation in the role graph model , 2006, SACMAT '06.
[23] David W. Chadwick,et al. The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management , 2013, 2013 International Conference on Availability, Reliability and Security.
[24] Félix Gómez Mármol,et al. TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.
[25] Robert H. Deng,et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited , 2018, Comput. Networks.
[26] Carlos E. Rubio-Medrano,et al. Supporting secure collaborations with attribute-based access control , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[27] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[28] Edward J. Coyne,et al. ABAC and RBAC: Scalable, Flexible, and Auditable Access Management , 2013, IT Professional.
[29] Joseph K. Liu,et al. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services , 2016, IEEE Transactions on Information Forensics and Security.
[30] Florian Kerschbaum. An access control model for mobile physical objects , 2010, SACMAT '10.
[31] Fan Hong,et al. An Attribute-Based Access Control Model for Web Services , 2006, PDCAT.
[32] Zahir Tari,et al. Hybrid Cryptographic Access Control for Cloud-Based EHR Systems , 2016, IEEE Cloud Computing.
[33] Fang Liu,et al. NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.
[34] Yingjiu Li,et al. An attribute-based access matrix model , 2005, SAC '05.
[35] Rakesh Bobba,et al. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption , 2009, ESORICS.
[36] Rajiv Ranjan,et al. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds , 2015, IEEE Cloud Computing.
[37] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[38] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[39] He Wang,et al. Static and Dynamic Delegation in the Role Graph Model , 2011, IEEE Transactions on Knowledge and Data Engineering.
[40] Fred B. Schneider,et al. Federated Identity Management Systems: A Privacy-Based Characterization , 2013, IEEE Security & Privacy.
[41] Kai Zhao,et al. Towards an Approach of Semantic Access Control for Cloud Computing , 2009, CloudCom.
[42] Zhen Liu,et al. Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.
[43] Bo Lang,et al. Attribute-Based Access Control for Layered Grid Resources , 2010, FGIT-FGCN.
[44] Gail-Joon Ahn,et al. Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.
[45] Haibo Shen. A Semantic-Aware Attribute-Based Access Control Model for Web Services , 2009, ICA3PP.
[46] Ramin Yahyapour,et al. An effective user revocation for policy-based access control schema in clouds , 2017, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet).
[47] Pinki Roy,et al. Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..
[48] Xiaolei Dong,et al. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[49] Jiguo Li,et al. Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..
[50] AlamMasoom,et al. A survey of cloud computing data integrity schemes , 2017 .
[51] Walid G. Aref,et al. A Distributed Access Control Architecture for Cloud Computing , 2012, IEEE Software.
[52] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[53] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[54] Mojtaba Alizadeh,et al. Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..
[55] Shilong Ma,et al. A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems , 2012, J. Networks.
[56] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[57] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[58] Patrice Clemente,et al. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system , 2014, Future Gener. Comput. Syst..
[59] Sushil Jajodia,et al. A logic-based framework for attribute based access control , 2004, FMSE '04.
[60] Daniel J. Buehrer,et al. CA-ABAC: Class Algebra Attribute-Based Access Control , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.
[61] Pieter H. Hartel,et al. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.
[62] Vivy Suhendra. A Survey on Access Control Deployment , 2011, FGIT-SecTech.
[63] Vijayalakshmi Atluri,et al. The Policy Machine: A novel architecture and framework for access control policy specification and enforcement , 2011, J. Syst. Archit..
[64] Yi Mu,et al. Dynamic Trust Model for Federated Identity Management , 2010, 2010 Fourth International Conference on Network and System Security.
[65] Sanjay Kumar Madria,et al. ETIS -- Efficient Trust and Identity Management System for Federated Service Providers , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[66] John Hughes,et al. Security Assertion Markup Language (SAML) 2.0 Technical Overview , 2004 .
[67] Zhen Ji,et al. Secure interoperation of identity managements among different circles of trust , 2011, Comput. Stand. Interfaces.
[68] E. Samlinson,et al. User-centric trust based identity as a service for federated cloud environment , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[69] Pieter H. Hartel,et al. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes , 2008, ISPEC.
[70] Ravi S. Sandhu,et al. PBDM: a flexible delegation model in RBAC , 2003, SACMAT '03.
[71] R. M. Alguliev,et al. Identity management based security architecture of cloud computing on multi-agent systems , 2013, Third International Conference on Innovative Computing Technology (INTECH 2013).
[72] Xin Wang,et al. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing , 2017, Sensors.
[73] Jingsha He,et al. Survey of access control models and technologies for cloud computing , 2018, Cluster Computing.
[74] Lei Wu,et al. Attribute-Based Access Control Security Model in Service-Oriented Computing , 2014 .
[75] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[76] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[77] Linlan Liu,et al. Study on Action and Attribute-Based Access Control Model for Web Services , 2009, 2009 Second International Symposium on Information Science and Engineering.
[78] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[79] Adeel Anjum,et al. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..
[80] David W. Chadwick,et al. CardSpace in the cloud , 2010, CCS '10.
[81] Sylvia L. Osborn,et al. HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control , 2014, FPS.
[82] R.W. Baldwin,et al. Naming and grouping privileges to simplify security management in large databases , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.