[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

User authentication using Blockchain based smart contract in role-based access control

P Kamboj, S Khare, S Pal - Peer-to-Peer Networking and Applications, 2021 - Springer
Since the last few decades, information security has become a significant challenge for
organizations' system administrators. However, the Role-Based Access Control (RBAC) …

A comprehensive review on secure data sharing in cloud environment

SK Kotha, MS Rani, B Subedi, A Chunduru… - Wireless Personal …, 2022 - Springer
Cloud computing is a constantly evolving archetype since web 2.0. Though it'sa popular IT
buzzword and concepts are derived from decade old grid computing, distributed computing …

An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

AUR Butt, T Mahmood, T Saba, SO Bahaj… - IEEE …, 2023 - ieeexplore.ieee.org
In today's world, services are improved and advanced in every field of life. Especially in the
health sector, information technology (IT) plays a vigorous role in electronic health (e …

A flexible fine-grained dynamic access control approach for cloud computing environment

S Mehraj, MT Banday - Cluster Computing, 2021 - Springer
As a pioneering surge of ICT technologies, offering computing resources on-demand, the
exceptional evolution of Cloud computing has not gone unnoticed by the IT world. At the …

[Retracted] Secure Delegation Using Enhanced Capability Model

KH Khan, IU Din, A Almogren… - Security and …, 2022 - Wiley Online Library
A secure delegation has a key role in collaborative and dynamic systems, and it brings new
challenges to security mechanisms. Secure delegation requires a flexible model that …

Survey of Secure Data Access Control Models in Cloud computing for EHR

SS Palkar, R Mehra, SD Jalane - International Research Journal on …, 2024 - irjaeh.com
Today cloud computing is the first choice of many individuals and different organizations.
Computing services offered by different CSP's are available as per need and the …

Reinforcement of the Multi-Cloud Infrastructure with Edge Computing

LS Morin, P Murali - Synergistic Interaction of Big Data with Cloud …, 2022 - taylorfrancis.com
Cloud computing and Edge computing are two new technologies that have the potential to
improve people's daily lives. Furthermore, the integration of cloud computing and edge …

Securing Resources in Decentralized Cloud Storage

S Mohite, G Bisane, K Bagle - NVEO-NATURAL VOLATILES & …, 2021 - nveo.org
Customers can get compute and storage services via a cloud computing environment, which
is composed of configurable large-scale data form based. A cloud provider, often termed as …

5 Reinforcement

P Murali - Synergistic Interaction of Big Data with Cloud …, 2022 - books.google.com
5.1..................................................................................................... 76 5.2...............................................
............................................. 76 5.3.................................................................................. 77 5.4 Why …