2011 4th IEEE International Conference on Broadband Network and Multimedia Technology 2011
DOI: 10.1109/icbnmt.2011.6155974
|View full text |Cite
|
Sign up to set email alerts
|

The privacy-aware access control system using attribute-and role-based access control in private cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…Current access control technology can be divided into Role-based Access Control (RBAC) and ABAC [15,16]. The RBAC [17] defines a set of users and roles.…”
Section: Access Control Modelmentioning
confidence: 99%
“…Current access control technology can be divided into Role-based Access Control (RBAC) and ABAC [15,16]. The RBAC [17] defines a set of users and roles.…”
Section: Access Control Modelmentioning
confidence: 99%
“…Insurance of confidentiality and integrity of system resources is a basic security service. Current access control technology can be divided into Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC) [37]. A recent study contributed to the mechanisms of Authentication and Access Control for IoT [38].…”
Section: Authentication and Access Control For Communicationmentioning
confidence: 99%
“…Resources are linked to the userâȂŹs identity, and permissions are store in an access matrix. This is centralized monolithic system and not suitable for distributed systems [9,10]. Mandatory access control(MAC) model: In this model multilevel security policies are based on required regulations determined by a central authority.…”
Section: Related Workmentioning
confidence: 99%