Access control is one of the key mechanisms for cloud computing security. When it comes to being used in cloud computing environments, RBAC is more scalable and more suitable compared with traditional discretionary and mandatory access control models. A straightforward way is to extend RBAC from traditional fields to cloud computing environments. In this chapter, several extended role-based access control schemes are surveyed from basic extension, A-RBAC, and trust-based RBAC separately. Core techniques of the proposed schemes are detailed. Comparisons around the proposed schemes are analyzed.
CITATION STYLE
L, H., Wang, S., Tian, X., Wei, W., & Sun, C. (2015). A survey of extended role-based access control in cloud computing. In Lecture Notes in Electrical Engineering (Vol. 355, pp. 821–831). Springer Verlag. https://doi.org/10.1007/978-3-319-11104-9_95
Mendeley helps you to discover research relevant for your work.