2022
DOI: 10.11591/ijece.v12i3.pp2765-2782
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing highly-collaborative access control system using a new role-mapping algorithm

Abstract: The collaboration among different organizations is considered one of the main benefits of moving applications and services to a cloud computing environment. Unfortunately, this collaboration raises many challenges such as the access of sensitive resources by unauthorized people. Usually, role based access-control (RBAC) Model is deployed in large organizations. The work in this paper is mainly considering the authorization scalability problem, which comes out due to the increase of shared resources and/or the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In [18], an access control framework consisting of a Cyber-Physical Access Control Model (CPAC) and a Generalized Action Generation Model (GAGM) was proposed, which aims to augment the enforcement of authorization policies for healthcare. However, the scalability of the RBAC schemes [18][19][20] may be affected by the large number of dynamic users and roles that are involved in conglomerate networks [10], and moreover, the permission-role assignment is hard to change.…”
Section: Access Controlmentioning
confidence: 99%
“…In [18], an access control framework consisting of a Cyber-Physical Access Control Model (CPAC) and a Generalized Action Generation Model (GAGM) was proposed, which aims to augment the enforcement of authorization policies for healthcare. However, the scalability of the RBAC schemes [18][19][20] may be affected by the large number of dynamic users and roles that are involved in conglomerate networks [10], and moreover, the permission-role assignment is hard to change.…”
Section: Access Controlmentioning
confidence: 99%
“…Dynamic congestion mechanism proposed forwarding rule that can be applied to select high-priority from the cloud service [28]. The role-mapping algorithm strategy reaches more saving in the amount of stored role-mapping rules that reduces the size of rule-store also minimizes the response time [29]- [31].…”
Section: Introductionmentioning
confidence: 99%