메뉴 건너뛰기




Volumn , Issue , 2012, Pages 43-48

A refined RBAC model for cloud computing

Author keywords

Cloud computing; Cloud security; Role based access control (RBAC)

Indexed keywords

ACCESS CONTROL MECHANISM; COMPUTING PARADIGM; COMPUTING RESOURCE; DATA ABSTRACTION; JOB FUNCTIONS; LEAST PRIVILEGE; RBAC MODEL; ROLE-BASED ACCESS CONTROL; ROLE-BASED ACCESS CONTROL MODEL; SECURITY IMPLICATIONS; SECURITY PRINCIPLES; SECURITY RISKS; SEPARATION OF DUTY;

EID: 84864074043     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIS.2012.13     Document Type: Conference Paper
Times cited : (16)

References (18)
  • 2
    • 77954051808 scopus 로고    scopus 로고
    • National Institute of Science and Technology, Retrieved 24 July
    • National Institute of Science and Technology. The NIST Definition of Cloud Computing (Draft). Retrieved 24 July 2011 from http//csrc.nist.gov/ publications/drafts/800-145/Draft-SP-800-145-cloud-definition.pdf.
    • (2011) The NIST Definition of Cloud Computing (Draft)
  • 5
    • 84864063059 scopus 로고    scopus 로고
    • Retrieved 28 July, from
    • Cloud Security Alliance. Domain 12: Guidance for Identity & Access Management V2.1, Retrieved 28 July 2011 from https://cloudsecurityalliance.org/ wpcontent/uploads/2011/07/csaguide-dom12-v2.10.pdf.
    • (2011) Domain 12: Guidance for Identity & Access Management V2.1
  • 8
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models, " IEEE Computer, Vol. 29, No. 2, February 1996, pp. 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 9
    • 4143121153 scopus 로고    scopus 로고
    • Access control and trust in the use of widely distributed services
    • Heidelberg, Germany, November, IEEE
    • J. Bacon, K. Moody and W. Yao, "Access Control and Trust in the Use of Widely Distributed Services, " Proceedings: Middleware 2001, Heidelberg, Germany, November 2001, IEEE, pp. 300-315.
    • (2001) Proceedings: Middleware 2001 , pp. 300-315
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 11
    • 33646165214 scopus 로고    scopus 로고
    • A pattern language for security models
    • Retrieved 24 July 2011 from
    • E. B. Fernandez and R. Pan, "A Pattern Language for Security Models, " Conference on Pattern Languages of Programs (PLoP) 2001, Retrieved 24 July 2011 from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90. 5898&rep=rep1&type=pdf.
    • (2001) Conference on Pattern Languages of Programs (PLoP)
    • Fernandez, E.B.1    Pan, R.2
  • 13
    • 77952176862 scopus 로고    scopus 로고
    • Cloud computing
    • Retrieved 24 July 2011 from
    • G. Boss, P. Malladi, D. Quan, L. Legregni, and H. Hall. Cloud computing. IBM White Paper, 2007, Retrieved 24 July 2011 from http://download.boulder.ibm. com/ibmdl/pub/software/dw/wes/hipods/Cloud-computing-wp-final-8Oct.pdf.
    • (2007) IBM White Paper
    • Boss, G.1    Malladi, P.2    Quan, D.3    Legregni, L.4    Hall, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.