Author:
Xie Lixia,Wei Ruixin,Ning Yuguang,Yang Hongyu
Publisher
Springer International Publishing
Reference12 articles.
1. Li, H., Min, Z., Feng, D., et al.: Research on access control of big data. Chin. J. Comput. (2017)
2. Wang, Y., Yang, J., Xu, C.: Survey on access control technologies for cloud computing. J. Softw. 26(5), 1129–1150 (2015)
3. Ray, I., Ray, I.: Trust-based access control for secure cloud computing. In: Han, K., Choi, B.Y., Song, S. (eds.) High Performance Cloud Auditing and Applications, pp. 189–213. Springer, New York (2014). https://doi.org/10.1007/978-1-4614-3296-8_8
4. Naghmouchi, M.Y., Perrot, N., Kheir, N.: A new risk assessment framework using graph theory for complex ICT systems. In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threat, MIST 2016, pp. 97–100. ACM Press, New York (2016)
5. Sendi, A.S., Cheriet, M.: Cloud computing: a risk assessment model. In: IEEE International Conference on Cloud Engineering, pp. 147–152. IEEE Press, Piscataway (2014)