2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380704
|View full text |Cite
|
Sign up to set email alerts
|

Risk based access control in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Lakshmi et al proposed a model for the identification of insider attackers by adjusting the session based on risk assessment. 20,21 Fall et al 22 also proposed a risk-adaptive authorization mechanism to satisfy the dynamicity in the cloud environment.…”
Section: Related Workmentioning
confidence: 99%
“…Lakshmi et al proposed a model for the identification of insider attackers by adjusting the session based on risk assessment. 20,21 Fall et al 22 also proposed a risk-adaptive authorization mechanism to satisfy the dynamicity in the cloud environment.…”
Section: Related Workmentioning
confidence: 99%