References
- Alvaro, J., & Beatritz, B. (2013). A New Cloud Computing Architecture. Journal of Computer and Applications. 2(2): 40-45.
- Anderson, R. (2011). Security Engineering: A Guide to Building Dependable Distributed Systems. Journal of Security Engineering. 2(1): 640-645.
- Avdhut, S. B. (2015). A Review of Role Based Encryption System for Secure Cloud Storage. International Journal of Computer Applications. 10(9): 975-980.
- Bamiah, M., Brohi, S., Chuprat S., & Brohi, N. (2012). Cloud Implementation Security Challenges. Journal of Security Engineering. 3(1): 174-178.
- Beaston, D., Hong, C., Zhang, M., & Feng, D.G. (2013). Cryptographic Access Control Scheme for Cloud Storage. Journal of Computer Research and Development. 4(7): 259-265.
- Beaty, K., Kundu, A., Naik V., & Acharya. A. (2013). Network Level Access Control Management for Cloud. IEEE International Conference on Cloud Engineering (IC2E). 98-107.
- Bell, D. & Lapadula. L. (2013). Secure Computer Systems: Mathematical Foundations. International Journal of Computer Applications. 6(9): 7-10. https://doi.org/10.5120/1343-1448
- Berman, S. (2013). Data Severe Dynamic Access Control Model. IEEE Transactions on Dependable and Secure Computing. 3(4): 221-229.
- Boneh, D., Boyen X., & Goh, E.J. (2005). Hierarchical Identity Based Encryption with Constant Size Cipher Text, in EUROCRYPT. New York, NY, USA: Springer Verlag. 3494: 440-556.
- Brucker, A., Bru, L., Kearney P., & Wolff. B. (2013). An Approach to Modular and Testable Security Models of Real World Health Care Applications. IEEE 16th ACM Symposium on Access Control Model and Technologies. 2(2): 133-142.
- Carroll, M., Merwe, V.D., & Kotze, P. (2011). Secure Cloud Computing Benefits, Risks and Controls. Journal of Information and Security. 6(5): 1-9.
- Chen, L., & Hoang, D.B., (2011). Novel Data Protection Model in Healthcare Cloud. IEEE 13th International Conference on High Performance Computing and Communications (HPCC). 550-555.
- Chen, D., & Zhao, H. (2012). Data Security and Privacy Protection in Cloud Computing. Computer Science and Electronic Engineering. 1(5): 647-651.
- Chong, A., Lai, H., & Bonti, A. (2011). Cloud Security Defense to Protect Cloud Computing. Journal of Network and Computer Applications. 34(4): 1097-1107. https://doi.org/10.1016/j.jnca.2010.06.004
- Crago, S. and Dunn, K., Eads, P., Hochstein, L., & Kang, M. (2011). Heterogeneous Cloud Computing. IEEE International Conference on Cluster Computing. 378-385.
- Ferraiolo, D., Barkley, J., & Kuhn, D. (2013). A Role Based Access Control Model. ACM Transactions on Information and System Security. 2(1): 34-64. https://doi.org/10.1145/300830.300834
- Green, M., Hohenberger, S., & Waters, B. (2011). Outsourcing the Decryption of ABE Cipher Texts. USENIX Security Symposium, USA. 78-83.
- Habiba, M., Islam, M., & Ali, A. (2013). Access Control Management for Cloud. IEEE 12th International Conference on Security and Privacy in Computing and Communications (TrustCom). 485-792.
- Hansten, A., Pankaj, P., & Rubal, C. W. (2012). Cloud Computing Security Issues. International Journal of Advanced Research in Computer Science and Software Engineering. 55 (21): 81-82.
- Hashizume, K., Rosado, D.G., & Fernandez, E. (2013). An Analysis of Security Issues for Cloud Computing. Journal of Internet Services and Applications. 4(1): 1-13. https://doi.org/10.1186/1869-0238-4-1
- Hocenski, Z. and Popovic, K. (2010). Cloud Security Alliance. 33rd MIPRO International Convention. 8(6): 344-349.
- Al-Ani, M.S. and Haddad, R. (2012). IPv4/IPv6 Transition. International Journal of Engineering Science. 4(12): 4815-4822.