메뉴 건너뛰기




Volumn 2, Issue , 2011, Pages 339-344

Research on trust-based access control model in cloud computing

Author keywords

access control; cloud computing; GTRBAC; trust

Indexed keywords

ACCESS PERMISSIONS; ANALYSIS RESULTS; COMPUTING ENVIRONMENTS; COMPUTING RESOURCE; DYNAMIC ACCESS CONTROL; GTRBAC; TRUST; TRUST-BASED ACCESS CONTROL;

EID: 80054734787     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITAIC.2011.6030345     Document Type: Conference Paper
Times cited : (25)

References (22)
  • 2
    • 74049154660 scopus 로고    scopus 로고
    • Secure and efficient access to outsourced data
    • USA
    • Weichao Wang., Zhiwei Li, "Secure and Efficient Access to Outsourced Data",CCSW'09, USA,2009,pp. 55-65.
    • (2009) CCSW'09 , pp. 55-65
    • Wang, W.1    Li, Z.2
  • 4
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transactions on Information and System Security,3(2), 2000,pp. 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2
  • 10
    • 80054760284 scopus 로고    scopus 로고
    • A policy-driven trust management framework
    • Proc. 1st Int Conference on Trust Mangement. Springer, Berlin
    • Walt Teh-Ming Yao.Fidelis, "A Policy-Driven Trust Management Framework," Proc. 1st Int Conference on Trust Mangement. LNCS 2692. Springer, Berlin,2003.
    • (2003) LNCS , vol.2692
    • Walt, T.-M.1    Yao, F.2
  • 12
    • 0242540377 scopus 로고    scopus 로고
    • Role-based access control for collaborative enterprise in peer-to-peer computing environments
    • Como,Italy
    • J.S. Park, J. Hwang, "Role-based access control for collaborative enterprise in peer-to-peer computing environments," Proc. 8th ACM Symposium on Access Control Models and Technologies, Como,Italy,2003,pp.93-99.
    • (2003) Proc. 8th ACM Symposium on Access Control Models and Technologies , pp. 93-99
    • Park, J.S.1    Hwang, J.2
  • 13
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • A. Juels, J. Burton, S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. of CCS' 07,2007,pp. 584-597.
    • (2007) Proc. of CCS' 07 , pp. 584-597
    • Juels, A.1    Burton, J.2    Kaliski, S.3
  • 15
    • 35248872156 scopus 로고    scopus 로고
    • From privacy legislation to interface design:Implementing information privacy in human-computer interactions
    • R. Dingledine(ed.) ,Springer-Verlag,Berlin
    • A. Patrick, S. Kenny, "From Privacy Legislation to Interface Design:Implementing Information Privacy in Human-Computer Interactions," R. Dingledine(ed.), pp. 107-124,LNCS 2760,Springer-Verlag,Berlin,2003.
    • (2003) LNCS , vol.2760 , pp. 107-124
    • Patrick, A.1    Kenny, S.2
  • 17
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • L.M. Kaufman, "Data Security in the World of Cloud Computing," IEEE Security & Privacy,2009.
    • (2009) IEEE Security & Privacy
    • Kaufman, L.M.1
  • 19
    • 57049132145 scopus 로고    scopus 로고
    • A browser-based kerberos authentication schene
    • Proc. 13th European Symposium on Research in Computer Security, Springer,Spain
    • S. Gajek, T. Jager, M. Manulis, and J. Schwenk, "A Browser-Based Kerberos Authentication Schene," Proc. 13th European Symposium on Research in Computer Security, 2008, pp. 115-129,LNCS 5283,Springer,Spain.
    • (2008) LNCS , vol.5283 , pp. 115-129
    • Gajek, S.1    Jager, T.2    Manulis, M.3    Schwenk, J.4
  • 21
    • 78650285206 scopus 로고    scopus 로고
    • Security analysis and validation for access control in multi-domain environment based on risk
    • Proc. 6th International Conference on Information Security Practice and Experience Conference, Seoul, Korea .
    • Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng, "Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk" Proc. 6th International Conference on Information Security Practice and Experience Conference, 2010,pp. 12-13. LNCS, Seoul, Korea.
    • (2010) LNCS , pp. 12-13
    • Tang, Z.1    Zhang, S.2    Li, K.3    Feng, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.