2015
DOI: 10.1007/978-3-319-11104-9_95
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Extended Role-Based Access Control in Cloud Computing

Abstract: Access control is one of the key mechanisms for cloud computing security. When it comes to being used in cloud computing environments, RBAC is more scalable and more suitable compared with traditional discretionary and mandatory access control models. A straightforward way is to extend RBAC from traditional fields to cloud computing environments. In this chapter, several extended role-based access control schemes are surveyed from basic extension, A-RBAC, and trust-based RBAC separately. Core techniques of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 21 publications
(19 reference statements)
0
4
0
Order By: Relevance
“…As for the existence of federated and distributed access control architectures in other related paradigms, there is actually an extensive literature on this subject [89,90]. Several of these mechanisms might be adapted to our context in order to solve existing open issues.…”
Section: Access Control Systemsmentioning
confidence: 99%
“…As for the existence of federated and distributed access control architectures in other related paradigms, there is actually an extensive literature on this subject [89,90]. Several of these mechanisms might be adapted to our context in order to solve existing open issues.…”
Section: Access Control Systemsmentioning
confidence: 99%
“…Moreover, to enhance an AC model in order to define additional rules, some AC models are extended by adding new component(s) to them. For example, in [ 23 ], a survey of an extended RBAC model in cloud computing is presented. In addition, an ABAC model extension is presented in [ 8 ], called hierarchical group and attribute-based access control (HGABAC), where groups and hierarchies of subjects and objects are added.…”
Section: Related Workmentioning
confidence: 99%
“…Task-role-based Access Control Task-role-based Access Control(T-RBAC) [19] is an Access Control Model Based on the enterprise environment. Unlike RBAC, the T-RBAC model treats tasks and roles as equals.…”
Section: Role-based Access Controlmentioning
confidence: 99%