ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING |
Mateen, Ahmed
(Computer Science Department, Chongqing University)
Zhu, Qingsheng (Computer Science Department, Chongqing University) Afsar, Salman (Computer Science Department, University of Agriculture Faisalabad) Rehan, Akmal (Computer Science Department, University of Agriculture Faisalabad) Mumtaz, Imran (Computer Science Department, University of Agriculture Faisalabad) Ahmad, Wasi (Department of Information Technology Resource Center and Data Bank (ITRCDB), University of Agriculture Faisalabad) |
1 | Anderson, R. (2011). Security Engineering: A Guide to Building Dependable Distributed Systems. Journal of Security Engineering. 2(1): 640-645. |
2 | Avdhut, S. B. (2015). A Review of Role Based Encryption System for Secure Cloud Storage. International Journal of Computer Applications. 10(9): 975-980. |
3 | Bamiah, M., Brohi, S., Chuprat S., & Brohi, N. (2012). Cloud Implementation Security Challenges. Journal of Security Engineering. 3(1): 174-178. |
4 | Beaston, D., Hong, C., Zhang, M., & Feng, D.G. (2013). Cryptographic Access Control Scheme for Cloud Storage. Journal of Computer Research and Development. 4(7): 259-265. |
5 | Beaty, K., Kundu, A., Naik V., & Acharya. A. (2013). Network Level Access Control Management for Cloud. IEEE International Conference on Cloud Engineering (IC2E). 98-107. |
6 | Bell, D. & Lapadula. L. (2013). Secure Computer Systems: Mathematical Foundations. International Journal of Computer Applications. 6(9): 7-10. DOI |
7 | Berman, S. (2013). Data Severe Dynamic Access Control Model. IEEE Transactions on Dependable and Secure Computing. 3(4): 221-229. |
8 | Boneh, D., Boyen X., & Goh, E.J. (2005). Hierarchical Identity Based Encryption with Constant Size Cipher Text, in EUROCRYPT. New York, NY, USA: Springer Verlag. 3494: 440-556. |
9 | Brucker, A., Bru, L., Kearney P., & Wolff. B. (2013). An Approach to Modular and Testable Security Models of Real World Health Care Applications. IEEE 16th ACM Symposium on Access Control Model and Technologies. 2(2): 133-142. |
10 | Carroll, M., Merwe, V.D., & Kotze, P. (2011). Secure Cloud Computing Benefits, Risks and Controls. Journal of Information and Security. 6(5): 1-9. |
11 | Chen, L., & Hoang, D.B., (2011). Novel Data Protection Model in Healthcare Cloud. IEEE 13th International Conference on High Performance Computing and Communications (HPCC). 550-555. |
12 | Chen, D., & Zhao, H. (2012). Data Security and Privacy Protection in Cloud Computing. Computer Science and Electronic Engineering. 1(5): 647-651. |
13 | Chong, A., Lai, H., & Bonti, A. (2011). Cloud Security Defense to Protect Cloud Computing. Journal of Network and Computer Applications. 34(4): 1097-1107. DOI |
14 | Habiba, M., Islam, M., & Ali, A. (2013). Access Control Management for Cloud. IEEE 12th International Conference on Security and Privacy in Computing and Communications (TrustCom). 485-792. |
15 | Crago, S. and Dunn, K., Eads, P., Hochstein, L., & Kang, M. (2011). Heterogeneous Cloud Computing. IEEE International Conference on Cluster Computing. 378-385. |
16 | Ferraiolo, D., Barkley, J., & Kuhn, D. (2013). A Role Based Access Control Model. ACM Transactions on Information and System Security. 2(1): 34-64. DOI |
17 | Green, M., Hohenberger, S., & Waters, B. (2011). Outsourcing the Decryption of ABE Cipher Texts. USENIX Security Symposium, USA. 78-83. |
18 | Hansten, A., Pankaj, P., & Rubal, C. W. (2012). Cloud Computing Security Issues. International Journal of Advanced Research in Computer Science and Software Engineering. 55 (21): 81-82. |
19 | Hashizume, K., Rosado, D.G., & Fernandez, E. (2013). An Analysis of Security Issues for Cloud Computing. Journal of Internet Services and Applications. 4(1): 1-13. DOI |
20 | Hocenski, Z. and Popovic, K. (2010). Cloud Security Alliance. 33rd MIPRO International Convention. 8(6): 344-349. |
21 | Al-Ani, M.S. and Haddad, R. (2012). IPv4/IPv6 Transition. International Journal of Engineering Science. 4(12): 4815-4822. |
22 | Alvaro, J., & Beatritz, B. (2013). A New Cloud Computing Architecture. Journal of Computer and Applications. 2(2): 40-45. |
![]() |