Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference31 articles.
1. Al-Dahhan, R.: Efficient ciphertext-policy attribute based encryption for cloud-based access control. Ph.D. thesis, Liverpool John Moores University. https://doi.org/10.24377/LJMU.t.00011013 (2019)
2. Alansari, S., Paci, F., Sassone, V.: A Distributed Access Control System for Cloud Federations. In: International Conference on Distributed Computing Systems (2017)
3. AWS: http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
4. Azure: https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles
5. Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1), 1–35 (2002). https://doi.org/10.1145/504909.504910
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献