References
- R. Aluvalu & L. Muddana. (2016). A Dynamic attribute-based risk aware access control model(DA-RAAC) for cloud computing. IEEE International Conference on Computational Intelligence and Computing Research. DOI : 10.1109/iccic.2016.7919618
- D. Zou, L. Shi & H. Jin. (2009). DVM_MAC:A Mandatory Access Control System in Distributed Virtual Computing Enviroment, IEEE 15th Internaltional Conference on Parallel and Distributed Systems, 556-563, DOI : 10.1109/ICPADS.2009.128
- W. Li, H. Wan, X. Ren & S. Li. (2012). A Refined RBAC Model for Cloud Computing, IEEE/ACIS International Conference on Computer and Information Science, 43-48 DOI : 10.1109/icis.2012.13
- C. Weng, Y. Luo, M. Li & X. Lu. (2008). A BLP-based Access Control Mechanism for the Virtual Machine System, IEEE 9th International Conference for Young Computer Scientists, 2278-2282. DOI : 10.1109/ICYCS.2008.503
- H. Zhu, Y. Xue, Y. Zhang, X. Chen, H. Li & X. Liu. (2013). V-MLR:A Multilevel Security Model for Virtualization, IEEE 5th International Conference on Intelligent Networking and Collaborative Systems, 9-16. DOI : 10.1109/INCoS.2013.12
- L. Kerr & J. Alves-Foss. (2016). Combining Mandatory and Attribute-bsed Access Control, IEEE 49th Hawaii International Conference o System Sciences, 2616-2623. DOI : 10.1109/HICSS.2016.328
- S. M. Lee, S. B. Suh, B. D Jeong & S. D. Mo. (2008). A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization, IEEE Communications Society, 251-256 DOI : 10.1109/ccnc08.2007.63
- Amazon Elastic Compute Cloud(EC2). (2009). http://aws.amazon.com/ec2.
- Amazon Simple Storage Service(S3) (2009). http://aws.amazon.com/s3.
- VMware vCenter Server. (2011). http://aws.vmware.com/products/vcenter-server.
- Windows Server 2008 Virtualization with Hyper-V. (2009).http://www.microsoft.com/windowsserver2008/en/us/hyperv-main.aspx.
- Ovirt. (2011). http://www.ovirt.org/.
- British Standards. (2013). ISO/IEC 27001:2013(E) (Information technlolgy-Security techniques-A Information security management systems-Rquirements)
- Y. Zhu, C. J. Hu, & X. Wang. (2015). From RBAC to ABAC:Constructing Flexible Data Access Control for Cloud Storage Services, IEEE Transactions on Services Computing, 8(4), 601-616. DOI : 10.1109/TSC.2014.2363474
- C. Pengrui, W. LingDa, Y. Chao & Y. Ronghuan. (2016). A Hierachical Access Control Model of Software Repository Based on RBAC, IEEE, 761-765 DOI : 10.1109/icsess.2016.7883179
- R. S. Sandhu, E. J. Coyne, H. L. Feinstein & C. E. Youman. (1996) Role-Based Access Control Models, COMPUTER SOCIETY, IEEE, 38-47
- E. B. Choi & S. J. Lee. (2016). Acces Control Mechanism based on MAC for Cloud Convergence, Jouunal of the Korea Convergence Society, 1-8 DOI : 10.15207/jkcs.2016.7.1.001
- M. Benedetti & M. Mori. (2018). Parametric RBAC Maintenance via Max-SAT. ACM on Symposium on Access Control Models and Technologies, 15-25. DOI : 10.1145/3205977.3205987