Author:
Majumder Abhishek,Namasudra Suyel,Nath Samir
Reference43 articles.
1. Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM T Inf Sys Secur 9(1):1–30
2. Ausanka-Crues R (2006) Methods for access control: advances and limitations.
http://www.cs.hmc.edu/~mike/public_html/courses/security/s06/projects/ryan.pdf
. Accessed 9 Oct 2013
3. Baldwin RW (1990) Naming and grouping privileges to simplify security management in large databases. In: Proceedings of the IEEE computer society symposium on research in security and privacy, pp 116–132, Oakland, USA, May 1990
4. Bell DE, Padula LJL (March 1976) Secure computer system: unified exposition and multics interpretation (Mitre Corporation).
http://www.dtic.mil/dtic/tr/fulltext/u2/a023588.pdf
. Accessed 7 Oct 2013
5. Bertino E, Bonatti PA, Ferrari E (2001) TRBAC: a temporal role-based access control model. ACM T Inf Syst Secur 4(3):191–233
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Data Access Control in the Cloud Computing Environment for Bioinformatics;Research Anthology on Bioinformatics, Genomics, and Computational Biology;2023-12-29
2. A systematic literature review for authorization and access control: definitions, strategies and models;International Journal of Web Information Systems;2022-08-15
3. Securing Cloud Virtual Machine Image Using Ethereum Blockchain;International Journal of Information Security and Privacy;2022-04-01
4. Authorization Strategies and Classification of Access Control Models;Future Data and Security Engineering;2021
5. Big Data and Privacy State of the Art;Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government;2021