Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization.
Stefano BerlatoRoberto CarboneAdam J. LeeSilvio RanisePublished in: AsiaCCS (2020)
Keyphrases
- access control
- protection schemes
- fine grained
- high assurance
- security policies
- data security
- security model
- identity management
- dynamic access control
- access control policies
- security mechanisms
- role based access control
- cloud computing
- security requirements
- policy enforcement
- access control models
- xml access control
- rbac model
- role based access control model
- mandatory access control
- access control mechanism