2011 International Conference on Machine Learning and Cybernetics 2011
DOI: 10.1109/icmlc.2011.6016897
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchy attribute-based access control model for cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Several approaches have been proposed for access control for cloud computing from different perspectives. Many of them use the cryptographic techniques, such as attribute‐based encryption , encryption‐enhanced temporal access control , and capability‐based cryptographic system . Others specifically addressed the resource virtualization challenges in cloud access control .…”
Section: Related Workmentioning
confidence: 99%
“…Several approaches have been proposed for access control for cloud computing from different perspectives. Many of them use the cryptographic techniques, such as attribute‐based encryption , encryption‐enhanced temporal access control , and capability‐based cryptographic system . Others specifically addressed the resource virtualization challenges in cloud access control .…”
Section: Related Workmentioning
confidence: 99%
“…-Shi-Xin, et al [4], propose an access control model to achieve a fine-grained, data confidentiality and scalability via a formal definition of the HABAC model (Hierarchy Attribute-Based Access Control). -Adamov and Hahanov [5], define a security model for individual cyberspace (ICS) protection as a means to ensure a secured user's virtual environment, they establish an analysis of security issues related to ICS and propose a conceptual model for modern security environments.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, cloud computing paradigm lacks a formal and verifiable model of its basic concepts: service delivery and deployment models, only some technological attempts are realized; for virtualization as it has been done in [2] and [3], for security as in [4], [5] and [6], or for enterprise IT as in [7]. In this work, we adopt, Bigraphical Reactive Systems (BRS), proposed by Milner [8] , as a formalism to specify fundamental aspects of cloud computing.…”
Section: Introductionmentioning
confidence: 99%
“…The key component of this system is a proxy server which is responsible for integrating the external storage services from the Internet, offering the new resources to the client computers on the intranet, and securing all data transfers as soon as they leave the trusted enterprise network zone [7].…”
Section: A Proxy Servermentioning
confidence: 99%