References
- R. Aluvalu & L. Muddana. (2016). A Dynamic atttribute-based risk aware access control model(DA-RAAC) for cloud computing, IEEE International Conference on Computational Intelligence and Computing Research(ICCIC), DOI : 10.1109/iccic.2016.7919618
- G. Sala, D. Sgandurra & F. Baiardi. (2007). Security and Integrity of a Distributed File Storage in a Vitual Environment, Fourth Inernational IEEE Security In Storage Workshop, 58-69. DOI : 10.1109/SISW.2007.10
- G. Cheng, H. Jin, D. Zou, A. Ohoussou & F. Zhao. (2008). A Prioritized Chinese Wall Model for Mananging the Covert Information Flows in Virtual Machine Systems, The 9th Inernational Conference for Young Computer Scienttists, 1481-1487. DOI : 10.1109/ICYCS.2008.534.
- F. Sabdhi. (2011). Cloud Computing Security Threates and Responses,, Inernational Conference on Communication Software and Networks(ICCSN), 245-249.
- F. Sabdhi. (2011). Virtualization-Lever Security in Cloud Computing, Inernational Conference on Communication Software and Networks(ICCSN), 250-254.
- T. Shinagawa, H. Eiraku, S. Hasegawa, K. Omote, K. Tanimoto, T. Horie & K. Kato. (2008). Introducing Role-based Access Control to a Secure Virtual Machine Monitor :Security Policy Enforcement Mechanism for Distributed Computers, 2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230. DOI : 10.1109/APSCC.2008.14
- C. Musca, A. Ion, C.Leordeanu & V. Cristea. (2013). Secure Aceess to Cloud Resource RBAC in Cloud System, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 554-558.
- http://aws.amazon.com/ec2.
- http://aws.amazon.com/s3.
- http://aws.vmware.com/products/vcenter-server.html
- British Standards. (2013). ISO/IEC 27001: 2013: Information Technology--Security Techniques--Information Security Management Systems--Requirements. International Organization for Standardization.
- C. Pengrui, W. LingDa, Y. Chao & Y. Ronghuan. (2016). A Hierachical Access Control Model of Software Repository Based on RBAC, IEEE, 761-765. DOI : 10.1109/icsess.2016.7883179
- T. Win, H Tianfield & Q. Mair. (2014). Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection, 2014 IEEE/ACM 7th International Conference on Utitiy and Cloud Computing, 1004-1009.
- Y. Sanches, S. Demurjian & M. Baihan. (2019). A Service-based RBAC & MAC approach incorporate into the FHIR standard, Digital Communications and Networks, 5, 214-225. DOI : 10.1016/j.dcan.2019.10.004
- E. Choi & S. Lee(2016), Access Control Mechanism based on MAC for Cloud Convergence, Journal of the Korea Convergence Society, 7(1), 1-8. DOI : 10.15207/jkcs.2016.7.1.001
- B. Taubmann, N. Rakotondravony & H. Reiser, (2016), CloudPhylactor:Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers, 2016 IEEE TrustCom-BigDataSE-ISPA, 957-964. DOI : 10.1109/TrustCom.2016.160
- E. Choi, (2018), A Virtualization Management Convergence Access Control Model for Cloud Computing Environments, Journal of Convergence for Information Technology, 8(5), 69-75. DOI : 10.22156/CS4SMB.2018.8.5.069
- X. Ding & J. Yang, (2019), An Access Control Model and Its Application in Blockchain, 2019 International Conference on Communications, Information System and Computer Engineering (CISCE), 163-167. DOI : 10.1109/CISCE.2019.00044