Discussion on Access Control Technology of Cloud Computing

被引:0
|
作者
Wang, Yibai [1 ]
Chen, Shi [1 ]
机构
[1] Changsha Med Univ, Changsha 410219, Hunan, Peoples R China
关键词
Cloud computing; access control; key technology;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper focuses on the discussion on access control technology of cloud computing. On the basis of briefly describing the composition and principle of access control technology, this paper analyzes some problems existing in cloud computing access control. Moreover, it presents key technologies for cloud access control. It is concluded that the scientific and reasonable application of cloud computing access control technology can effectively guarantee the security of cloud computing resources to provide some help to the relevant cloud computing staff.
引用
收藏
页码:77 / 80
页数:4
相关论文
共 50 条
  • [1] A Survey of Cloud Computing Access Control Technology
    Wang, Minghao
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [2] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [3] Discussion on Business Isolation Technology in the Cloud Computing Environment
    Li Zhiming
    Guo Jianbo
    Ma Jiang
    [J]. PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND INFORMATION SYSTEM (ICETIS 2013), 2013, 65 : 187 - 190
  • [4] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    [J]. IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [5] Towards Temporal Access Control in Cloud Computing
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Huang, Dijiang
    Wang, Shanbiao
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2576 - 2580
  • [6] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [7] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    [J]. The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [8] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [9] Survey on Access Control Issues in Cloud Computing
    Charanya, R.
    Aramudhan, M.
    [J]. FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [10] Enhancing Access Control Trees for Cloud Computing
    Ayeb, Neil
    Di Cerbo, Francesco
    Trabelsi, Slim
    [J]. CURRENT TRENDS IN WEB ENGINEERING, ICWE 2016 INTERNATIONAL WORKSHOPS, 2016, 9881 : 29 - 38