Access Control for the Cloud Based on Multi-device Authentication.
Lorena González-ManzanoJosé María de FuentesAgustín OrfilaPublished in: TrustCom/BigDataSE/ISPA (1) (2015)
Keyphrases
- access control
- security mechanisms
- identity management
- fine grained
- security requirements
- data security
- dynamic access control
- security policies
- trust relationships
- access control policies
- cloud computing
- access control models
- role based access control
- databases
- role based access control model
- security model
- rbac model
- database security
- rights management
- role assignment
- discretionary access control
- data protection
- wireless sensor networks