Role-Based Access Control Models
Computer
How to Explain Zero-Knowledge Protocols to Your Children
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Providing architectural support for building context-aware applications
Providing architectural support for building context-aware applications
Proceedings of the 11th ACM conference on Computer and communications security
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
A new RBAC based access control model for cloud computing
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Hi-index | 0.00 |
This paper suggests an adaptive access algorithm to decide the access control to the resources using an improved RBAC technique to solve more complex and difficult problems in the cloud computing environment. And the proposed model determines dynamically security level and access control for the common resources. Therefore, it is supposed to provide appropriate security services according to the dynamic changes of the common resources.