L Lin, J Hu, J Zhang - Frontiers of Computer Science, 2016 - Springer
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when …
Security models using access control policies have over the years improved from Role- based access control (RBAC) to newer models which have added some features like …
Y Luo, C Xia, L Lv, Z Wei, Y Li - Security and Communication …, 2015 - Wiley Online Library
In the last 10 years, virtualization has become a widespread technique in cloud computing; however, few of the access control models have ever addressed the security issue of multi …
K Brown, M Hayes, D Allison… - Concurrency and …, 2015 - Wiley Online Library
A data providing service (DPS) in service‐oriented architecture is tasked only with the retrieval of data that are annotated over a domain ontology. One particular motivating …
Y Luo, Y Li, Q Tang, Z Wei, C Xia - … ICoC 2013, Zhangjiajie, China, July 10 …, 2013 - Springer
This paper extends RBAC's authorizing ability via adding domain and virtual machine features aiming at applying in the virtualized scenarios. We define a new model named …
Y Li, Y Luo, Z Wei, C Xia, X Liang - 2013 Ninth International …, 2013 - ieeexplore.ieee.org
The enlargement of the current enterprise network scale makes the conflict between application systems and network devices inevitable. To address this issue, this paper …
W Zhang, ZQ Lin - Advanced Materials Research, 2013 - Trans Tech Publ
Although the ANSI RBAC model has achieved great success in the enterprise, it provides no mechanism for the urgent interoperation needs between distributed domains. This paper …