Model of Attribute-Based Access Control in Cloud Computing
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    As a new mode of service, cloud computing receives the favour of various enterprises in recent years. Though there are three kinds of deployment models to be chosen, enterprises also worry about the storage and transmission security of data. A method of Attribute Based Access Control(ABAC) was used to ensure that only authorized users had access to the data in the cloud. In addition, the method of rough set attribute reduction method was used to reduce the redundant attributes, retain authority conflicts and speed up the access time.

    Reference
    Related
    Cited by
Get Citation

毋涛,张帆.云计算下基于属性的访问控制方法.计算机系统应用,2016,25(2):231-234

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 16,2015
  • Revised:July 02,2015
  • Adopted:
  • Online: February 23,2016
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063