2015
DOI: 10.1016/j.comcom.2015.07.005
|View full text |Cite
|
Sign up to set email alerts
|

Robust access control framework for mobile cloud computing network

Abstract: Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of unified communications, employees exploit the advantages of smart devices and 4G wireless technology to access the data from anywhere and anytime. Security protocols such as access control designed for traditional setup are not sufficient when inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 30 publications
(15 citation statements)
references
References 39 publications
0
15
0
Order By: Relevance
“…There exist a number of RBAC extensions that are particularly suitable for defining policies in the context of mobile and context aware systems, e.g. [4], [29], [31] just to name a few. Our system does not pose any constraint on the access control system and it is flexible to support any context aware access policy.…”
Section: Related Workmentioning
confidence: 99%
“…There exist a number of RBAC extensions that are particularly suitable for defining policies in the context of mobile and context aware systems, e.g. [4], [29], [31] just to name a few. Our system does not pose any constraint on the access control system and it is flexible to support any context aware access policy.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al (2015) proposed an access control framework for mobile cloud environment which uses dynamic attributes such as unlock failures and application usage and location of the devices in addition to static attributes used in traditional ABE scheme. The scheme involves both single and multi-attribute authorities for attribute management.…”
Section: Related Workmentioning
confidence: 99%
“…There is, however, no perfect security and when a security incident involving cloud services occurs, digital investigation will require the identification, preservation and analysis of evidential data (Ab Rahman and Choo 2015;Quick, Martini and Choo 2013). Therefore, it is unsurprising that cloud security has seen significant research interest recently (Al Said and Rana 2014;Choo, Domingo-Ferrer and Zhang 2016;Li et al 2015;Rahulamathavan et al 2014). …”
Section: Introductionmentioning
confidence: 99%