Majumder et al., 2014 - Google Patents
Taxonomy and classification of access control models for cloud environmentsMajumder et al., 2014
- Document ID
- 17930264331995441889
- Author
- Majumder A
- Namasudra S
- Nath S
- Publication year
- Publication venue
- Continued rise of the cloud: Advances and trends in cloud computing
External Links
Snippet
Cloud computing is an emerging and highly attractive technology due to its inherent efficiency, cost-effectiveness, flexibility, scalability and pay-per-use characteristics. But alongside these advantages, many new problems have also surfaced and some of these …
- 238000004458 analytical method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5011—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Majumder et al. | Taxonomy and classification of access control models for cloud environments | |
El Sibai et al. | A survey on access control mechanisms for cloud computing | |
Megouache et al. | Ensuring user authentication and data integrity in multi-cloud environment | |
Ghaffari et al. | Authentication and access control based on distributed ledger technology: A survey | |
Esposito | Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations | |
Sauber et al. | A new secure model for data protection over cloud computing | |
Khan et al. | Context-aware access control for clinical information systems | |
Alam et al. | Garbled role-based access control in the cloud | |
Shynu et al. | A comprehensive survey and analysis on access control schemes in cloud environment | |
Rashid et al. | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations | |
Ray et al. | Trust-based access control for secure cloud computing | |
Masood et al. | Comparative analysis of access control systems on cloud | |
Zaghloul et al. | d-EMR: Secure and distributed Electronic Medical Record management | |
Nweke et al. | Understanding attribute-based access control for modelling and analysing healthcare professionals’ security practices | |
Vijayalakshmi et al. | Shared access control models for big data: a perspective study and analysis | |
Velmurugan et al. | Provably secure data selective sharing scheme with cloud-based decentralized trust management systems | |
Tawfik et al. | ACHealthChain blockchain framework for access control and privacy preservation in healthcare | |
Raj et al. | A blockchain based lightweight and secure access control framework for IoT-enabled supply chain | |
Boughdiri et al. | How Does Blockchain Enhance Zero Trust Security in IoMT? | |
Khan et al. | Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology | |
Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
Dhanalakshmi et al. | Secure and Privacy-Preserving storage of E-Healthcare data in the cloud: advanced data integrity measures and privacy assurance | |
Talib | Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment | |
Kaffel-Ben Ayed et al. | A generic Kerberos-based access control system for the cloud | |
Vijayakumar et al. | RETRACTED ARTICLE: Protecting user profile based on attribute-based encryption using multilevel access security by restricting unauthorization in the cloud environment |