What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Abstract
Index Terms
- What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Recommendations
A new RBAC based access control model for cloud computing
GPC'12: Proceedings of the 7th international conference on Advances in Grid and Pervasive ComputingAccess Control is an important component of Cloud Computing; specially, User access control management; however, Access Control in Cloud environment is different from traditional access environment and using general access control model can't cover all ...
Protecting outsourced data in cloud computing through access management
Data outsourcing is a major component for cloud computing because data owners are able to distribute resources to external services for sharing with users and organizations. A crucial problem for owners is how to secure sensitive information accessed by ...
Research on Security of Access Control for Cloud Computing Environment
Security, Privacy, and Anonymity in Computation, Communication, and StorageAbstractCloud computing is considered as one of the most dominant paradigms in the Information Technology industry these days. It offers new cost effective services. With the rapid development of cloud computing, cloud security issues are becoming ...
Comments
Information & Contributors
Information
Published In

- General Chair:
- Sylvia Osborn,
- Program Chairs:
- Mahesh V. Tripunitara,
- Ian M. Molloy
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Panel
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 492Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in