2018
DOI: 10.1007/978-3-030-03359-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Based Access Control in Cloud Computing Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 18 publications
0
19
0
Order By: Relevance
“…Regular recognition does not create acceptable outcomes for investigators who examine security episodes in the Cloud. Khilar et al [16] described CC that hosts devoted registering resources that got to whenever from anyplace. This creates flexibility in information retrieval, information inescapability, and versatility, and is used in ML methods.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
See 2 more Smart Citations
“…Regular recognition does not create acceptable outcomes for investigators who examine security episodes in the Cloud. Khilar et al [16] described CC that hosts devoted registering resources that got to whenever from anyplace. This creates flexibility in information retrieval, information inescapability, and versatility, and is used in ML methods.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
“…The authors used artificial neural networks (ANNs) over the scrambled information. Khilar et al [16] surveyed trust-based security issues and challenges in the cloud models. They defined CC as an appropriated processing condition that hosts devoted registering resources to any time from any place.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Of course, this interesting and challenging issue would be included in our future research topics. Thanks also to the reviewer for bringing the following useful references to us [34,35].…”
Section: Discussionmentioning
confidence: 99%
“…There are five types of trust models, i.e., based on agreement, feedback, domain, certificates/keys, and subject. Our proposed model is an improvement of the traditional machine learning model (Khilar et al, 2019), and we also design it for a cloud service provider. The fuzzy based trust model comes under the subjective based model.…”
Section: Introductionmentioning
confidence: 99%