2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2018
DOI: 10.1109/waina.2018.00131
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Open Source Network Access Control in Virtual Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…Privacy protection is taken to prevent the exposure of personal information and sensitive information stored in the cloud, the sharing of data, computing, integrity verification, delete and other operations, as well as the entire life [1]. In order to protect the user's information and personal privacy, several solution methods usually are taken, such as access control, encryption, trust technology or a variety of combination of the above methods [2], [4]- [6]. Dynamic computing and storage services of cloud computing promote significant changes in information technology field [12], [14], at the same time, which also has brought tremendous impact to security and privacy, as follows:…”
Section: A Risks Of Cloud Computingmentioning
confidence: 99%
See 4 more Smart Citations
“…Privacy protection is taken to prevent the exposure of personal information and sensitive information stored in the cloud, the sharing of data, computing, integrity verification, delete and other operations, as well as the entire life [1]. In order to protect the user's information and personal privacy, several solution methods usually are taken, such as access control, encryption, trust technology or a variety of combination of the above methods [2], [4]- [6]. Dynamic computing and storage services of cloud computing promote significant changes in information technology field [12], [14], at the same time, which also has brought tremendous impact to security and privacy, as follows:…”
Section: A Risks Of Cloud Computingmentioning
confidence: 99%
“…3. A group of rules and procedures can enable legitimate users' authority to various data access in the access control, which is a key technology to guarantee the information confidentiality, integrity and data privacy in the network security [1], [6], [16]. Compared the traditional network environment, the access control technology is more important in cloud environment [5], [8].…”
Section: B Tradition Access Controlmentioning
confidence: 99%
See 3 more Smart Citations