Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016 (2016), Article ID 9820590, 8 pages
http://dx.doi.org/10.1155/2016/9820590
Research Article

Cloud Multidomain Access Control Model Based on Role and Trust-Degree

School of Computer Science and Technology, Civil Aviation University of China, No. 2898, Jinbei Road, Tianjin 300300, China

Received 10 November 2015; Accepted 22 February 2016

Academic Editor: Hui Cheng

Copyright © 2016 Lixia Xie and Chong Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. Jun, Research on the Hierarchical Authorization Management of Role-Based Access Control, Xidian University, Xi'an, China, 2012.
  2. S. Barker, M. J. Sergot, and D. Wijesekera, “Status-based access control,” ACM Transactions on Information and System Security, vol. 12, no. 1, pp. 1–47, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. W. Han, M. Xu, W. Zhao, and G. Li, “A trusted decentralized access control framework for the client/server architecture,” Journal of Network and Computer Applications, vol. 33, no. 2, pp. 76–83, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. N.-H. Li, M. V. Tripunitara, and Q.-H. Wang, “Resiliency policies in access control,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 113–123, ACM Press, 2009. View at Publisher · View at Google Scholar
  5. J. Kuriharay, E. Uzun, and C. A. Wood, “An encryption-based access control framework for content-centric networking,” in Proceedings of the 14th IFIP Networking Conference, pp. 1–9, IEEE, Toulouse, France, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Zhou and B. Li, “iHAC: a hybrid access control framework for IaaS clouds,” in Proceedings of the IEEE/ACM 7th International Conference on Utilty and Cloud Computing (UCC '14), pp. 853–858, London, UK, December 2014.
  7. W. Tolone, G. J. Ahn, and T. Pai, “Access system,” Journal of ACM Computing Surveys, vol. 37, no. 1, pp. 29–41, 2005. View at Google Scholar
  8. S. Barker, M. J. Sergot, and D. Wijesekera, “Status-based access control,” ACM Transactions on Information and System Security, vol. 12, no. 1, article 1, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. W. Liang and G. Ya-Jun, “Reputation-based on trust evaluation mechanism for P2P system,” Computer Engineering and Applications, vol. 45, no. 15, pp. 136–138, 2009. View at Google Scholar
  10. S. Ma, J. He, and F. Gao, “An access control model based on multi-factors trust,” Journal of Networks, vol. 7, no. 1, pp. 173–178, 2012. View at Publisher · View at Google Scholar · View at Scopus