A trust-based cloud computing access control model
@article{Huang2016ATC, title={A trust-based cloud computing access control model}, author={Lanying Huang and Zenggang Xiong and Guangwei Wang and Conghuan Ye}, journal={International Journal of Knowledge-based and Intelligent Engineering Systems}, year={2016}, volume={20}, pages={197 - 203}, url={https://api.semanticscholar.org/CorpusID:34096739} }
The paper presents a new trust model where the concepts are introduced, e.g. authentication, trust threshold value and secondary verification, etc and the trust value is ranked and a detailed computing method is disclosed for credibility value.
4 Citations
Survey of Access Controls in Cloud Computing
- 2020
Computer Science
This paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes and compare them based on different factors to help decision-makers to choose properly the access controls that meet their requirements.
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
- 2022
Computer Science, Engineering
A literature review of the published articles that have dealt with cloud access control requirements and techniques yielded 21 requirements and nine mechanisms, reported by 20 manuscripts, that will help researchers, academics and practitioners assess the effectiveness of cloudAccess control models and identify gaps that are not addressed in the proposed solutions.
Towards Optimistic Access Control for Cloud-Based Collaborative Editors
- 2019
Computer Science
This paper presents a study on existing cloud-based collaborative editors and the current state of the art of access control models used in the collaborative edition context and sketches a new access model for deploying securely mobile collaborative editing applications in the cloud.
19 References
Trust-based P2P access control model
- 2008
Computer Science
A dynamic trust-based access control model is developed to address to the access security in P2P environments.
Access Control in New Network Environment
- 2007
Computer Science, Engineering
It is proposed that trustworthy networks as the developing goal of the next generation Internet require using trust-based the access control model to assure security.
A New RBAC Based Access Control Model for Cloud Computing
- 2012
Computer Science
A new access control based on Role-based access control (RBAC) model, which includes two kind of roles, user role (UR) and owner role (OR), is proposed and can reduce the security problems to two classes in the RT [←,∩] role-based trust-management language with a test-paper system.
Cloud Computing Security Research
- 2011
Computer Science, Engineering
The emergence and development of cloud computing and cloud computing security failure events is introduced and government security measures should be taken to put forward relevant recommendations.
Role-Based Access Control Models
- 1996
Computer Science
Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Task-Based Access Control Model
- 2003
Computer Science
An access control mechanism called TBAC (task-based access control) is introduced, which models from the tasks in workflow and dynamically manage the permissions through tasks and tasks' status.
Method of coverage-preserving nodes scheduling in clusters for wireless sensor networks
- 2011
Computer Science, Engineering
Simulations in Matlab 7.1 indicate that, for one thing, this method can decrease the energy consumption of WSNs, and the schedule efficiency has an affinity with node density and node monitor radius.
TRBAC
- 2001
Computer Science
Temporal-RBAC (TRBAC), an extension of the RBAC model, is introduced, an extension of the RBAC model that supports periodic role enabling and disabling, and temporal dependencies among such actions, expressed by means of role triggers.
Modeling and H∞ control of wireless networked control system with both delay and packet loss
- 2015
Computer Science, Engineering
Massive volume data organization in geo-science based on relational database
- 2008
Computer Science, Geography
A new space division method, the homologous octree, is proposed and a massive volume data organization method based on relational database with its strategy for space search, multi-resolution, data swapping between main memory and external storage is demonstrated.