2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2016
DOI: 10.1109/iccic.2016.7919618
|View full text |Cite
|
Sign up to set email alerts
|

A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Daoud et al [30] proposed the use of dynamic risk-and role-based access control to prevent intrusions against cloud computing, which combines eXtensible access control markup language decisions, risk analysis, and vulnerability reviews to obtain the appropriate access decisions. Rajani Kanth Aluvalu et al [31] proposed a risk-aware model based on dynamic attributes. It is combined with a common access control model, where risk calculation and attributes used for access control will be combined.…”
Section: Related Workmentioning
confidence: 99%
“…Daoud et al [30] proposed the use of dynamic risk-and role-based access control to prevent intrusions against cloud computing, which combines eXtensible access control markup language decisions, risk analysis, and vulnerability reviews to obtain the appropriate access decisions. Rajani Kanth Aluvalu et al [31] proposed a risk-aware model based on dynamic attributes. It is combined with a common access control model, where risk calculation and attributes used for access control will be combined.…”
Section: Related Workmentioning
confidence: 99%
“…Other risk-based access control models have also been proposed in recent years. Aluvalu et al proposed a dynamic attribute-based risk-aware access control model, which could be hybridized with static access control models with various attribute encryptions, such as KP-ABE, CP-ABE, and HASBE [42]. Based on an extension of XACML, Dos Santos et al proposed a framework for enforcing risk-based policies [43].…”
Section: Risk-based Access Controlsmentioning
confidence: 99%
“…Those which are based on the RBAC model [35,36,37] use security policies that focus on the role of the user instead of his identity. Those based on the ABAC model [38,39,40,41], use security policies that focus on user attributes and their values (name, email address, role). In a Cloud environment, we notice the use of the new ARBAC model [42,43,44], which is the combination of the RBAC and ABAC models, where the role of the user is considered as an attribute but the security policies are based only on it.…”
Section: Authorizationmentioning
confidence: 99%