An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing.
Rohit AhujaSraban Kumar MohantyKouichi SakuraiPublished in: AsiaJCIS (2016)
Keyphrases
- cloud computing
- control scheme
- identity management
- access control
- closed loop
- security policies
- control system
- dynamic model
- control strategy
- computing resources
- access control policies
- data center
- cloud computing environment
- control law
- internet services
- network access
- service providers
- computing technologies
- data management
- big data
- distributed computing
- business models
- cloud computing platform
- security issues
- control loop
- computing infrastructure
- computing platform
- cloud services
- data mining
- databases
- cloud storage
- nonlinear systems
- middleware architecture
- real time