Proceedings of the 27th Annual ACM Symposium on Applied Computing 2012
DOI: 10.1145/2245276.2245365
|View full text |Cite
|
Sign up to set email alerts
|

A policy-based decentralized authorization management framework for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Organizations should not assume that because the system is hosted by a cloud provider that security is also handled externally. Current research on this topic includes solutions by Shin et al showing methods for authorization [12] and access control [13].…”
Section: B Protecting Against Cloud Exploitsmentioning
confidence: 99%
“…Organizations should not assume that because the system is hosted by a cloud provider that security is also handled externally. Current research on this topic includes solutions by Shin et al showing methods for authorization [12] and access control [13].…”
Section: B Protecting Against Cloud Exploitsmentioning
confidence: 99%
“…Agreements with the service provider must define these capabilities. Organizations should consider methods for secure authorization and access control specific to clouds [Shin 2011[Shin , 2012.…”
Section: Protective Measuresmentioning
confidence: 99%
“…*Address correspondence to this author at the School of Business and Management, Donghua University, Shanghai 200051, China; Tel: 13879068233; E-mail: 403848072@qq.com Dynamic distribution vehicles path optimization model and design of solution algorithm is a very tricky problem [9]. From application of actual fact, when the production enterprise or customer gave their demand of goods in the cold chain logistics distribution, the team charged for distribution [10].…”
Section: Introductionmentioning
confidence: 99%