A survey of extended role-based access control in cloud computing

16Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Access control is one of the key mechanisms for cloud computing security. When it comes to being used in cloud computing environments, RBAC is more scalable and more suitable compared with traditional discretionary and mandatory access control models. A straightforward way is to extend RBAC from traditional fields to cloud computing environments. In this chapter, several extended role-based access control schemes are surveyed from basic extension, A-RBAC, and trust-based RBAC separately. Core techniques of the proposed schemes are detailed. Comparisons around the proposed schemes are analyzed.

Cite

CITATION STYLE

APA

L, H., Wang, S., Tian, X., Wei, W., & Sun, C. (2015). A survey of extended role-based access control in cloud computing. In Lecture Notes in Electrical Engineering (Vol. 355, pp. 821–831). Springer Verlag. https://doi.org/10.1007/978-3-319-11104-9_95

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free