Main Article Content
Almorsy, M., J. Grundy, and I. Müller, An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107, 2016.
Barati, M., et al. A new semantic role-based access control model for cloud computing. in 9th International Conference on Internet and Web Applications and Services, Paris. 2014. Citeseer.
Bhargava, R., R. Pramoda, and D. Mudugurki, Dynamic RBAC Model for Cloud Computing. 2015.
Chang, V., Y.-H. Kuo, and M. Ramachandran, Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 2016. 57: p. 24-41. - https://doi.org/10.1016/j.future.2015.09.031
Choi, C., J. Choi, and P. Kim, Ontology-based access control model for security policy reasoning in cloud computing. The Journal of Supercomputing, 2014. 67(3): p. 711-722. - https://doi.org/10.1007/s11227-013-0980-1
Ed-Daibouni, M., et al., Toward a New Extension of the Access Control Model ABAC for Cloud Computing, in Advances in Ubiquitous Networking. 2016, Springer. p. 79-89. - https://doi.org/10.1007/978-981-287-990-5_7
Fernandes, D.A., et al., Security issues in cloud environments: a survey. International Journal of Information Security, 2014. 13(2): p. 113-170. - https://doi.org/10.1007/s10207-013-0208-7
Garg, S.K., S. Versteeg, and R. Buyya, A framework for ranking of cloud computing services. Future Generation Computer Systems, 2013. 29(4): p. 1012-1023. - https://doi.org/10.1016/j.future.2012.06.006
Ghazi, Y., et al., Usage-Based Access Control for Cloud Applications, in Innovative Solutions for Access Control Management. 2016, IGI Global. p. 197-223. - https://doi.org/10.4018/978-1-5225-0448-1.ch007
Grewal, R.K. and P.K. Pateriya, A rule-based approach for effective resource provisioning in hybrid cloud environment, in New Paradigms in Internet Computing. 2013, Springer. p. 41-57. - https://doi.org/10.1007/978-3-642-35461-8_5
Kalloniatis, C., H. Mouratidis, and S. Islam, Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering, 2013. 18(4): p. 299-319. - https://doi.org/10.1007/s00766-013-0166-7
Kaur, P.D. and I. Chana, Cloud based intelligent system for delivering health care as a service. Computer methods and programs in biomedicine, 2014. 113(1): p. 346-359. - https://doi.org/10.1016/j.cmpb.2013.09.013
Li, H., et al. A survey of extended role-based access control in cloud computing. in Proceedings of the 4th International Conference on Computer Engineering and Networks. 2015. Springer. - https://doi.org/10.1007/978-3-319-11104-9_95
Lin, C.-Y., C.-H. Fu, and Y.-L. Yeh, A Lightweight Fine-grained Sensitive Data Access Control Model in a Cloud Computing Environment. ??????, 2016. 37(1): p. 1-14.
Lin, G., et al., MTBAC: a mutual trust based access control model in cloud computing. China Communications, 2014. 11(4): p. 154-162. - https://doi.org/10.1109/CC.2014.6827577
Liu, C.-L., Cloud service access control system based on ontologies. Advances in Engineering Software, 2014. 69: p. 26-36. - https://doi.org/10.1016/j.advengsoft.2013.12.006
Liu, J.K., et al., Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 2016. 11(3): p. 484-497. - https://doi.org/10.1109/TIFS.2015.2493983
Lo, N.W., T.C. Yang, and M.H. Guo, An attribute-role based access control mechanism for multi-tenancy cloud environment. Wireless Personal Communications, 2015. 84(3): p. 2119-2134. - https://doi.org/10.1007/s11277-015-2515-y
Madani, M.A., M. Erradi, and Y. Benkaouz, A Collaborative Task Role Based Access Control Model. Journal of Information Assurance & Security, 2016. 11(6).
Manuel, P., A trust model of cloud computing based on Quality of Service. Annals of Operations Research, 2015. 233(1): p. 281-292. - https://doi.org/10.1007/s10479-013-1380-x
Modi, C., et al., A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 2013. 63(2): p. 561-592. - https://doi.org/10.1007/s11227-012-0831-5
Pandey, S., et al. Security enforcement using TRBAC in cloud computing. in Computing, Communication and Automation (ICCCA), 2016 International Conference on. 2016. IEEE.
Raju, R., et al. A heuristic fault tolerant MapReduce framework for minimizing makespan in Hybrid Cloud Environment. in Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on. 2014. IEEE.
Rehman, S. and R. Gautam. Research on Access Control Techniques in SaaS of Cloud Computing. in International Symposium on Security in Computing and Communication. 2014. Springer. - https://doi.org/10.1007/978-3-662-44966-0_9
Riad, K., et al. AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing. in Collaboration and Internet Computing (CIC), 2015 IEEE Conference on. 2015. IEEE.
Rittinghouse, J.W. and J.F. Ransome, Cloud computing: implementation, management, and security. 2016: CRC press.
Satoh, I. Toward Access Control Model for Context-Aware Services Offloaded to Cloud Computing. in Reliable Distributed Systems Workshops (SRDSW), 2016 IEEE 35th Symposium on. 2016. IEEE.
Varadharajan, V. and U. Tupakula, Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 2014. 11(1): p. 60-75. - https://doi.org/10.1109/TNSM.2014.041614.120394
Younis, Y.A., K. Kifayat, and M. Merabti, An access control model for cloud computing. Journal of Information Security and Applications, 2014. 19(1): p. 45-60. - https://doi.org/10.1016/j.jisa.2014.04.003