2018
DOI: 10.13052/jcsm2245-1439.731
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Access Control Mechanisms in Cloud Computing

Abstract: The benefits that Internet-based applications and services have given to the end user with today's cloud computing technology are very remarkable. The distributed services instantly scaled over the Internet provided by cloud computing can be achieved by using some mechanisms in the background. It is a critical task for end users to control access to resources because lack of control often leads to security risks. In addition, this may cause systems to fail. This paper describes seven different access control m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 103 publications
0
4
0
Order By: Relevance
“…The National Institute of Standards and Technology (NIST) proposed a set of quality metrics of AC systems [30] in 2006, which were used by [31] in 2012 to define respective evaluation properties. These metrics are also used to evaluate concepts, not only systems [32]. Properties need to The properties in [31] are grouped into four categories: administration, enforcement, performance, and support.…”
Section: Assessmentmentioning
confidence: 99%
See 3 more Smart Citations
“…The National Institute of Standards and Technology (NIST) proposed a set of quality metrics of AC systems [30] in 2006, which were used by [31] in 2012 to define respective evaluation properties. These metrics are also used to evaluate concepts, not only systems [32]. Properties need to The properties in [31] are grouped into four categories: administration, enforcement, performance, and support.…”
Section: Assessmentmentioning
confidence: 99%
“…-Yes. The ABAC model enforces an intermediate level of the least privilege principle as access rights and constraints can be specified using attributes [32]. Thus, XACML4G supports this property the same way as for XACML.…”
Section: Least Privilege Principle Support (Optional)mentioning
confidence: 99%
See 2 more Smart Citations