2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12) 2012
DOI: 10.1109/icccnt.2012.6395994
|View full text |Cite
|
Sign up to set email alerts
|

To improve the current security model and efficiency in cloud computing using access control matrix

Abstract: Cloud computing is the new technique adopted recently by many IT companies and business organizations, with the intention to minimize the cost spent on the data stored. There are many cloud service providers like Amazon, Microsoft, etc. By moving to a cloud servers, a department of maintaining a own data center can be eliminated and core business can be concentrated more, because the data management will be done by the cloud service providers itself. The data stored in the cloud is private and should be allowe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…shows an example for data head ed access control model was al. [10] to improve the current iency in cloud computing rix model, when a subject wants the access rights to access the ject will be stored." Because of equests to access an object for ry time, the access is not granted hecked first.…”
Section: Access Controls and User Authentication Modelsmentioning
confidence: 99%
“…shows an example for data head ed access control model was al. [10] to improve the current iency in cloud computing rix model, when a subject wants the access rights to access the ject will be stored." Because of equests to access an object for ry time, the access is not granted hecked first.…”
Section: Access Controls and User Authentication Modelsmentioning
confidence: 99%