[go: up one dir, main page]

Majumder et al., 2014 - Google Patents

Taxonomy and classification of access control models for cloud environments

Majumder et al., 2014

Document ID
17930264331995441889
Author
Majumder A
Namasudra S
Nath S
Publication year
Publication venue
Continued rise of the cloud: Advances and trends in cloud computing

External Links

Snippet

Cloud computing is an emerging and highly attractive technology due to its inherent efficiency, cost-effectiveness, flexibility, scalability and pay-per-use characteristics. But alongside these advantages, many new problems have also surfaced and some of these …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30017Multimedia data retrieval; Retrieval of more than one type of audiovisual media

Similar Documents

Publication Publication Date Title
Majumder et al. Taxonomy and classification of access control models for cloud environments
El Sibai et al. A survey on access control mechanisms for cloud computing
Megouache et al. Ensuring user authentication and data integrity in multi-cloud environment
Ghaffari et al. Authentication and access control based on distributed ledger technology: A survey
Esposito Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations
Sauber et al. A new secure model for data protection over cloud computing
Khan et al. Context-aware access control for clinical information systems
Alam et al. Garbled role-based access control in the cloud
Shynu et al. A comprehensive survey and analysis on access control schemes in cloud environment
Rashid et al. RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
Ray et al. Trust-based access control for secure cloud computing
Masood et al. Comparative analysis of access control systems on cloud
Zaghloul et al. d-EMR: Secure and distributed Electronic Medical Record management
Nweke et al. Understanding attribute-based access control for modelling and analysing healthcare professionals’ security practices
Vijayalakshmi et al. Shared access control models for big data: a perspective study and analysis
Velmurugan et al. Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
Tawfik et al. ACHealthChain blockchain framework for access control and privacy preservation in healthcare
Raj et al. A blockchain based lightweight and secure access control framework for IoT-enabled supply chain
Boughdiri et al. How Does Blockchain Enhance Zero Trust Security in IoMT?
Khan et al. Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Dhanalakshmi et al. Secure and Privacy-Preserving storage of E-Healthcare data in the cloud: advanced data integrity measures and privacy assurance
Talib Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment
Kaffel-Ben Ayed et al. A generic Kerberos-based access control system for the cloud
Vijayakumar et al. RETRACTED ARTICLE: Protecting user profile based on attribute-based encryption using multilevel access security by restricting unauthorization in the cloud environment