2014
DOI: 10.1016/j.advengsoft.2013.12.006
|View full text |Cite
|
Sign up to set email alerts
|

Cloud service access control system based on ontologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Unreliable access control policies are identified by policy conflict analysis rules. In any case, the work doesn't utilize the standard ontology tool, which would not be flexible to adopt at all [16].…”
Section: Related Workmentioning
confidence: 99%
“…Unreliable access control policies are identified by policy conflict analysis rules. In any case, the work doesn't utilize the standard ontology tool, which would not be flexible to adopt at all [16].…”
Section: Related Workmentioning
confidence: 99%
“…Roles define both the specific individuals access to resources and the extent to which resources are accessed. Because of its advantages in reducing the complexity of security administration and supporting a review of permissions assigned to users, RBAC has attracted considerable attentions . introduces a cryptographic administrative model AdC‐RBAC for managing and enforcing access policies by using cryptographic techniques to ensure that the administrative tasks are performed only by authorized administrative roles.…”
Section: Related Workmentioning
confidence: 99%
“… introduces a cryptographic administrative model AdC‐RBAC for managing and enforcing access policies by using cryptographic techniques to ensure that the administrative tasks are performed only by authorized administrative roles. extends RBAC to propose the cloud service access control (CSAC) system to automatically support for access control policy analysis and execution in cloud services.…”
Section: Related Workmentioning
confidence: 99%
“…The CSAC system consist of seven module: access deny and grant determine if access is grantable or to be denied, resource used observer checks the resource usage, payment status observer checks the paying bill accounts of user, policy statement used by admin to specify the policies of access control, policy conflicts detector is used to check the inconsistency between policies, conflicts resolver is used to resolve the inconsistency between the policies of access control, and ontologies administration modifies the relationship and concept. Two elements are considered in CSAC system, first one is service level agreement and second is payment status [6]. Payment status is the process of payment stages in the accounting records of cloud service providers.…”
Section: B Csac Modelmentioning
confidence: 99%
“…Payment status is the process of payment stages in the accounting records of cloud service providers. Service level agreement is the commitment between the service provider and consumer which define level of services and control the computing resource usage, therefore Service level agreement is needed to be consider in cloud access control model [6]. The user concept explosion and object concept explosion [6] is calculated using CSAC model and compared with RBAC model.…”
Section: B Csac Modelmentioning
confidence: 99%