2018
DOI: 10.1007/s13042-018-0840-7
|View full text |Cite
|
Sign up to set email alerts
|

Role based access control design using three-way formal concept analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Role-based access control (RBAC) frameworks are widely employed to assign permissions based on job responsibilities, reducing the risk of unauthorised access. Cloud governance strategies should integrate IAM solutions seamlessly to manage access effectively across the entire cloud ecosystem (Subramanian, Cherukuri, & Chelliah, 2018;Uddin, Islam, & Al-Nemrat, 2019). In the cloud, accountability is not just a matter of internal policy; it extends to the relationships with cloud service providers (CSPs).…”
Section: Grc Strategies In Modern Cloud Infrastructures Governance In...mentioning
confidence: 99%
“…Role-based access control (RBAC) frameworks are widely employed to assign permissions based on job responsibilities, reducing the risk of unauthorised access. Cloud governance strategies should integrate IAM solutions seamlessly to manage access effectively across the entire cloud ecosystem (Subramanian, Cherukuri, & Chelliah, 2018;Uddin, Islam, & Al-Nemrat, 2019). In the cloud, accountability is not just a matter of internal policy; it extends to the relationships with cloud service providers (CSPs).…”
Section: Grc Strategies In Modern Cloud Infrastructures Governance In...mentioning
confidence: 99%
“…The access control models can be divided into 5 categories: the discretionary access control (DAC) [5], the mandatory access control (MAC) [6], the role-based access control (RBAC) [7][8][9], the attribute-based access control (ABAC) [10], the policy-based access control (PBAC) [11,12]. Various data security algorithms are used to improve the security of the access control model.…”
Section: Introductionmentioning
confidence: 99%