2018
DOI: 10.1016/j.cose.2017.10.014
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving fine-grained location-based access control for mobile cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…In order to meet the needs of the company's internal mobile office, Google designed and implemented a relatively stable zero trust network model BeyondCorp [36], in which the authorized access rights after identity authentication need to be obtained by granting the access agent authorization information through the "access control engine." It adopts the ZTN method for access control, but does not describe in detail the implementation of policy language, risk management, or decision-making continuity, and does not fully consider the inheritance and reuse of existing networks, just visualize its security capabilities as a product.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…In order to meet the needs of the company's internal mobile office, Google designed and implemented a relatively stable zero trust network model BeyondCorp [36], in which the authorized access rights after identity authentication need to be obtained by granting the access agent authorization information through the "access control engine." It adopts the ZTN method for access control, but does not describe in detail the implementation of policy language, risk management, or decision-making continuity, and does not fully consider the inheritance and reuse of existing networks, just visualize its security capabilities as a product.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…T. Baseri et al [16] proposed a multi-authority attribute-based access control scheme to support the coexistence of authorities. The proposed scheme used the dynamic location of mobile users as contextual information about those users, employed location range constraints as a policy in attribute-based encryption, and authorized users with dynamic locations satisfying access policies.…”
Section: Fine-grained Access Controlmentioning
confidence: 99%
“…In [ 100 ], the authors proposed a framework of access control and verification schemes based on location-controlled functions named location-constrained roles-based access control (LCRBAC). The authors describe cyberspace and physical space as a static topology for the LCRBAC scheme by describing cyber objects and physical object dynamic behaviors.…”
Section: Taxonomy Of Ml-based Aa For Iotmentioning
confidence: 99%