2016
DOI: 10.1016/j.jnca.2016.08.013
|View full text |Cite
|
Sign up to set email alerts
|

A framework and risk assessment approaches for risk-based access control in the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(20 citation statements)
references
References 32 publications
0
20
0
Order By: Relevance
“…More formally, when a call to a sub-sequence finishes and returns a ′, the initial is updated to +1 as follows: .UC n+1 = (UAP n , AccessedSet(UC n ) ∨ AccessedSet(UC ' )) (16) Note that the original UAP remains the same as it was before the sub-sequence call was made, and it is only updated when the user execution returns to the original flowchart. It is also important to note that the dependent calls and the UC' returned by the sub-sequence call can have revocation lists associated with them as described in section V.B.2).…”
Section: Subsequence Callsmentioning
confidence: 99%
“…More formally, when a call to a sub-sequence finishes and returns a ′, the initial is updated to +1 as follows: .UC n+1 = (UAP n , AccessedSet(UC n ) ∨ AccessedSet(UC ' )) (16) Note that the original UAP remains the same as it was before the sub-sequence call was made, and it is only updated when the user execution returns to the original flowchart. It is also important to note that the dependent calls and the UC' returned by the sub-sequence call can have revocation lists associated with them as described in section V.B.2).…”
Section: Subsequence Callsmentioning
confidence: 99%
“…RAdAC also works well in rapid-change environment to cater larger range of increase in users and resources. Nevertheless, failure in managing user identity and access structure in RAdAC has led to poor cloud management [12]. Thus, the implementation of RAdAC model is advantageous if the management of user identity and hidden access structure can be carried out effectively.…”
Section: Risk-adaptable Access Control (Radac)mentioning
confidence: 99%
“…Ontology in risk based access control is the extended work of [12] to define the independent risk policies of RAdAC model in specific hierarchical process. Subsequently, the ontology approach in RAdAC allows risk quantification without the need of cloud federation.…”
Section: Risk-adaptable Access Control (Radac)mentioning
confidence: 99%
See 2 more Smart Citations