Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016 (2016), Article ID 2935638, 16 pages
http://dx.doi.org/10.1155/2016/2935638
Research Article

A 4D-Role Based Access Control Model for Multitenancy Cloud Platform

School of Software Engineering, Tongji University, Shanghai 201804, China

Received 15 August 2015; Revised 26 January 2016; Accepted 31 January 2016

Academic Editor: Anders Eriksson

Copyright © 2016 Jiangfeng Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. W. Lo, T. C. Yang, and M. H. Guo, “An attribute-role based access control mechanism for multi-tenancy cloud environment,” Wireless Personal Communications, vol. 84, no. 3, pp. 2119–2134, 2015. View at Publisher · View at Google Scholar
  2. X. Feng, B. Ge, Y. Sun et al., “Enhancing role management in role-based access control,” in Proceedings of the 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT '10), pp. 677–683, Beijing, China, October 2010. View at Publisher · View at Google Scholar
  3. S. Ranise, A. Truong, and A. Armando, “Scalable and precise automated analysis of administrative temporal role-based access control,” in Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT '14), pp. 103–114, ACM, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Lee, D. K. Kim, H. Yang, and H. Jang, “Role-based access control for substation automation systems using XACML,” Information Systems, vol. 53, pp. 237–249, 2015. View at Publisher · View at Google Scholar
  5. S. Raje, C. Davuluri, M. Freitas, R. Ramnath, and J. Ramanathan, “Using ontology-based methods for implementing role-based access control in cooperative systems,” in Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC '12), pp. 763–764, Trento, Italy, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Kim, D.-K. Kim, L. Lu, S. Kim, and S. Park, “A feature-based approach for modeling role-based access control systems,” Journal of Systems and Software, vol. 84, no. 12, pp. 2035–2052, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. M. E. Kabir, H. Wang, and E. Bertino, “A role-involved purpose-based access control model,” Information Systems Frontiers, vol. 14, no. 3, pp. 809–822, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Gupta, M. S. Kirkpatrick, and E. Bertino, “A formal proximity model for RBAC systems,” Computers & Security, vol. 41, pp. 52–67, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. S. A. Mohammed and M. M. Yusof, “Towards an evaluation method for information quality management of health information systems,” in Proceedings of the 2nd International Conference on Information Management and Evaluation (ICIME '11), pp. 529–538, Toronto, Canada, April 2011.
  10. L. Liqing, Y. Rong, L. Hai, and L. Xudong, “Research of extended RBAC model on permission control in WEB information system,” in Proceedings of the IEEE 3rd International Conference on Communication Software and Networks (ICCSN '11), pp. 359–362, IEEE, Xi'an, China, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. C.-X. Zhang, J.-F. Li, Y. Liu, and W.-D. Zhao, “Design and implementation of universal management system based on roles and scopes,” Computer Engineering, vol. 7, no. 34, pp. 47–49, 2008. View at Google Scholar
  12. J. Li and C. Zhang, “A three-dimensional role based user management model in web information systems,” in Proceedings of the 2012 International Conference on Information Technology and Software Engineering: Information Technology, vol. 210 of Lecture Notes in Electrical Engineering, pp. 657–665, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  13. X. H. Le, T. Doll, M. Barbosu, A. Luque, and D. Wang, “An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow,” Journal of Biomedical Informatics, vol. 45, no. 6, pp. 1084–1107, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, “Proposed NIST standard for role-based access control,” ACM Transactions on Information and System Security, vol. 4, no. 3, pp. 224–274, 2001. View at Publisher · View at Google Scholar
  15. R. S. Sandhu, E. J. Coyne, H. L. Feinstein et al., “Role-based access control models,” Computer, no. 2, pp. 38–47, 1996. View at Google Scholar
  16. T. C. Yang, N. W. Lo, and H. T. Liaw, “An enhancement RBAC mechanism for multi-tenancy cloud environment,” in Proceedings of the International Workshop on Advanced Information Technology and Applications, 2012.