Role-Based Access Control Models
Computer
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Role-Based Access Control
Context-Based Access Control for Ubiquitous Service Provisioning
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Context-sensitive Access Control Model and Implementation
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment
Journal of Network and Computer Applications
Designing Host and Network Sensors to Mitigate the Insider Threat
IEEE Security and Privacy
Service chain-based business alliance formation in service-oriented architecture
Expert Systems with Applications: An International Journal
Evolutionary approach for semantic-based query sampling in large-scale information sources
Information Sciences: an International Journal
Hi-index | 0.00 |
There are many security issues in cloud computing service environments, including virtualization, distributed big-data processing, serviceability, traffic management, application security, access control, authentication, and cryptography, among others. In particular, data access using various resources requires an authentication and access control model for integrated management and control in cloud computing environments. Cloud computing services are differentiated according to security policies because of differences in the permitted access right between service providers and users. RBAC (Role-based access control) and C-RBAC (Context-aware RBAC) models do not suggest effective and practical solutions for managers and users based on dynamic access control methods, suggesting a need for a new model of dynamic access control that can address the limitations of cloud computing characteristics. This paper proposes Onto-ACM (ontology-based access control model), a semantic analysis model that can address the difference in the permitted access control between service providers and users. The proposed model is a model of intelligent context-aware access for proactively applying the access level of resource access based on ontology reasoning and semantic analysis method.