2013
DOI: 10.14257/ijgdc.2013.6.6.01
|View full text |Cite
|
Sign up to set email alerts
|

Context-Aware Access Control Model for Cloud Computing

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 13 publications
0
4
0
1
Order By: Relevance
“…In the cloud, the relation between users and resources is dynamic, so users and service providers might not be in the same security domain and hence identity-based securities such as Discretionary access control (DAC) or Mandatory access control (MAC) cannot be used in an open cloud computing environment. Zhou et al [91] proposed a new Context-Aware Access Control for cloud computing (CAACM) by considering platform trust level, spatial state and temporal state as context. The particular model determines mechanisms of authorization from cloud management role to objects allowing dynamic activation of role permission by identifying cloud management role with context.…”
Section: The Caac Approaches For Accessing Data From Edge Iot and CLmentioning
confidence: 99%
“…In the cloud, the relation between users and resources is dynamic, so users and service providers might not be in the same security domain and hence identity-based securities such as Discretionary access control (DAC) or Mandatory access control (MAC) cannot be used in an open cloud computing environment. Zhou et al [91] proposed a new Context-Aware Access Control for cloud computing (CAACM) by considering platform trust level, spatial state and temporal state as context. The particular model determines mechanisms of authorization from cloud management role to objects allowing dynamic activation of role permission by identifying cloud management role with context.…”
Section: The Caac Approaches For Accessing Data From Edge Iot and CLmentioning
confidence: 99%
“…The values and meanings of α and D j are the same as in Formula (9). As in Formula (9), N(t), C(t) and M(t) represent the usage of network bandwidth, CPU and memory at time t, respectively. Correspondingly, 1-N(t),1-C(t) and 1-M(t) represent the free percentage of these resources, respectively.…”
Section: N(t) Is the Network Bandwidth Usage C(t) Is The Cpu Usage mentioning
confidence: 99%
“…9, No. 1 (2016) [1][2][3][4][5][6][7][8][9] Co-published by Atlantis Press and Taylor & Francis Copyright: the authors 1 much more complicated than that in general network environments.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cluster server adalah sekumpulan server independen yang beroperasi serta bekerja secara erat dan terlihat oleh klien jaringan seolah-olah server-server tersebut adalah satu buah unit server [5]. Kelebihan dari cluster server adalah kecepatan akses data yang lebih baik daripada server tunggal sehingga cluster server ini mempunyai kemampuan komputasi yang relatif baik.…”
Section: Cluster Serverunclassified