Author:
Ed-Daibouni Maryam,Lebbat Adil,Tallal Saida,Medromi Hicham
Reference19 articles.
1. Bowen, B.M., Ben Salem, M., Hershkop, S.: Designing host and network sensors to mitigate the insider threat. IEEE Security Privacy Mag. 7(6), 22–29 (2009)
2. Jung, J.J.: Service chain-based business alliance formation in service-oriented architecture. Expert Syst. Appl. 38(3), 2206–2211 (2011)
3. Kiyomoto, S., Fukushima, K., Miyake, Y.: Towards secure cloud computing architecture—a solution based on software protection mechanism. J. Internet Serv. Inf. Secur. 1(1), 4–17 (2011)
4. Pieters, W.: Representing humans in system security models: an actor-network approach. J. Wirel. Mobile Netw. Ubiquitous Comput. Depend. Appl. 2(1), 75–92 (2011)
5. Bhaskar, P., Admela, J., Dimitrios, K., Yves, G.: Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach. J. Grid Computing 9(1), 3–26 (2011)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Combining ID’s, Attributes, and Policies in Hyperledger Fabric;Blockchain Technology and Emerging Technologies;2023
2. An Extended Attribute-Based Access Control (ABAC) Model for Distributed Collaborative Healthcare System;Research Anthology on Securing Medical Systems and Records;2022-06-03
3. An access control and authorization model with Open stack cloud for Smart Grid;ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal;2020-11-04
4. An Extended Attribute-Based Access Control (ABAC) Model for Distributed Collaborative Healthcare System;International Journal of Service Science, Management, Engineering, and Technology;2019-10
5. An ABAC Based Policy Definement for Enriching Access Control in Cloud;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2019-02-02