Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing.
Jong P. YoonZhixiong ChenPublished in: NDT (1) (2010)
Keyphrases
- access control
- cloud computing
- computing resources
- security policies
- access control policies
- cloud computing platform
- identity management
- private cloud
- fine grained
- computing infrastructure
- data center
- service providers
- distributed computing
- data management
- conflict resolution
- security issues
- security mechanisms
- cloud services
- network access
- resource allocation
- grid computing
- resource management
- security requirements
- data privacy
- intelligent agents