EACF: extensible access control framework for cloud environments

The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing fea...

Full description

Saved in:
Bibliographic Details
Published in:Annales des télécommunications Vol. 72; no. 5-6; pp. 307 - 323
Main Authors: Mehak, Faria, Masood, Rahat, Shibli, Muhammad Awais, Elgedway, Islam
Format: Journal Article
Language:English
Published: Paris Springer Paris 01.06.2017
Springer Nature B.V
Subjects:
ISSN:0003-4347, 1958-9395
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing features such as generality, extensibility, and flexibility. Secondly, they are static in nature, such that once the user is authorized, they do not evaluate the access request during and after the resource usage. Every application hosted in the cloud has its own requirement of evaluating access request; some applications require request evaluation before assigning resources, while some require continuous monitoring of resource usage along with a dynamic update of attribute values. To address these diverse requirements, we present an Extensible Access Control Framework (EACF) for cloud-based applications, which provides high-level extensibility by incorporating different access control models about the needs of the Cloud service consumers (organizations). A number of access control models are combined in the EACF, which provides reliable authorization service for managing and controlling access to the software as a service-hosted cloud applications.It also helps cloud consumers to provide authorized access to resources (data), as well as contributes to eliminate the need to write customized security code for individual applications. As a case study, three access control models are incorporated into the framework and tested on SaaS-hosted application DSpace to ascertain that the proposed features are functional and working fine.
AbstractList The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing features such as generality, extensibility, and flexibility. Secondly, they are static in nature, such that once the user is authorized, they do not evaluate the access request during and after the resource usage. Every application hosted in the cloud has its own requirement of evaluating access request; some applications require request evaluation before assigning resources, while some require continuous monitoring of resource usage along with a dynamic update of attribute values. To address these diverse requirements, we present an Extensible Access Control Framework (EACF) for cloud-based applications, which provides high-level extensibility by incorporating different access control models about the needs of the Cloud service consumers (organizations). A number of access control models are combined in the EACF, which provides reliable authorization service for managing and controlling access to the software as a service-hosted cloud applications.It also helps cloud consumers to provide authorized access to resources (data), as well as contributes to eliminate the need to write customized security code for individual applications. As a case study, three access control models are incorporated into the framework and tested on SaaS-hosted application DSpace to ascertain that the proposed features are functional and working fine.
Author Mehak, Faria
Elgedway, Islam
Shibli, Muhammad Awais
Masood, Rahat
Author_xml – sequence: 1
  givenname: Faria
  surname: Mehak
  fullname: Mehak, Faria
  organization: School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST)
– sequence: 2
  givenname: Rahat
  surname: Masood
  fullname: Masood, Rahat
  email: rahat.masood@student.unsw.edu.au
  organization: School of Electrical Engineering and Telecommunications (EE&T), University of New South Wales (UNSW)
– sequence: 3
  givenname: Muhammad Awais
  surname: Shibli
  fullname: Shibli, Muhammad Awais
  organization: VisionIT
– sequence: 4
  givenname: Islam
  surname: Elgedway
  fullname: Elgedway, Islam
  organization: Middle East Technical University (METU), Northern Cyprus Campus
BookMark eNp9kD1PwzAURS1UJNrCD2CLxGx4juM4ZqKqWkCqxAKz5TgvKCW1i53y8e9JFAaEBNNd7nkfZ0Ymzjsk5JzBJQOQV5GlacYpsJyCyArKjsiUKVFQxZWYkCkAcJrxTJ6QWYxbgBykEFNys1os19cJfnToYlO2mBhrMcbEetcF3yZ1MDt89-ElqX1IbOsPVYLurQne7dB18ZQc16aNePadc_K0Xj0u7-jm4fZ-udhQy4XqqJJFXeW2kpCKskityRGRg-C2TKVlVZ0bo6w0nAErTaaYhSwXfVQllFwhn5OLce4--NcDxk5v_SG4fqVmCkAIDpz1LTm2bPAxBqy1bTrTNcMzpmk1Az3o0qMu3evSgy49kOwXuQ_NzoTPf5l0ZGLfdc8Yftz0J_QFmHd-Rw
CitedBy_id crossref_primary_10_1007_s12243_017_0578_3
Cites_doi 10.1007/978-3-642-30767-6_24
10.1145/507721.507722
10.1109/ICBNMT.2011.6155974
10.1109/CISE.2010.5677061
10.1109/ICWS.2005.25
10.1007/s11704-014-3160-4
10.1109/INFCOM.2010.5462174
10.1109/CloudCom.2010.44
10.1145/1900008.1900154
10.1109/TISC.2010.5714624
10.1145/2435349.2435389
10.1145/507711.507722
10.1016/j.jisa.2014.04.003
10.1045/january2003-smith
10.1145/2295136.2295170
10.1109/ICDH.2012.50
10.1109/MS.2011.153
10.1145/2523514.2527005
10.1007/978-1-4471-6452-4_2
10.1631/jzus.C0910466
10.1145/2523514.2523549
10.1145/2309996.2310049
10.1145/2484313.2484383
10.1109/CloudCom.2010.13
10.1109/SRDS.2007.40
10.1007/978-1-4419-5906-5_784
10.1145/1815396.1815587
10.1109/ICDCSW.2012.65
10.1016/j.sysarc.2010.04.005
10.1145/1868447.1868454
ContentType Journal Article
Copyright Institut Mines-Télécom and Springer-Verlag France 2016
Copyright Springer Science & Business Media 2017
Copyright_xml – notice: Institut Mines-Télécom and Springer-Verlag France 2016
– notice: Copyright Springer Science & Business Media 2017
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s12243-016-0548-1
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1958-9395
EndPage 323
ExternalDocumentID 10_1007_s12243_016_0548_1
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.86
.VR
06D
07C
0R~
0VY
1N0
2.D
203
23M
29~
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
4.4
406
408
40D
40E
5GY
5VS
67Z
6J9
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADQRH
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
CAG
COF
CSCUP
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
H13
HF~
HG5
HG6
HMJXF
HRMNR
HVGLF
HZ~
IJ-
IKXTQ
IWAJR
IXC
IXD
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JZLTJ
KOV
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NF0
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
P19
P2P
P9P
PF0
PT4
PT5
QOK
QOS
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z7Y
Z7Z
Z83
Z88
Z8M
Z8R
Z8T
Z8W
Z92
_50
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABJCF
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
AYFIA
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
K7-
M7S
PHGZM
PHGZT
PQGLB
PTHSS
JQ2
ID FETCH-LOGICAL-c359t-978fd6cd7025b82ca6eee3053cb27c1df6aa9c7a3101ba491c046591cdb0b39e3
IEDL.DBID RSV
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000401762500007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0003-4347
IngestDate Wed Sep 17 13:50:50 EDT 2025
Sat Nov 29 06:34:55 EST 2025
Tue Nov 18 22:28:57 EST 2025
Fri Feb 21 02:32:55 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 5-6
Keywords Authorization
Fine-grained access control
Software-as-a-service
Cloud computing
Extensible access control markup language
Access control-as-a-service
Usage-based access control
Attribute-based access control
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c359t-978fd6cd7025b82ca6eee3053cb27c1df6aa9c7a3101ba491c046591cdb0b39e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://hdl.handle.net/11511/67809
PQID 1900553031
PQPubID 2043972
PageCount 17
ParticipantIDs proquest_journals_1900553031
crossref_citationtrail_10_1007_s12243_016_0548_1
crossref_primary_10_1007_s12243_016_0548_1
springer_journals_10_1007_s12243_016_0548_1
PublicationCentury 2000
PublicationDate 2017-06-01
PublicationDateYYYYMMDD 2017-06-01
PublicationDate_xml – month: 06
  year: 2017
  text: 2017-06-01
  day: 01
PublicationDecade 2010
PublicationPlace Paris
PublicationPlace_xml – name: Paris
– name: Heidelberg
PublicationTitle Annales des télécommunications
PublicationTitleAbbrev Ann. Telecommun
PublicationYear 2017
Publisher Springer Paris
Springer Nature B.V
Publisher_xml – name: Springer Paris
– name: Springer Nature B.V
References Bates A, Mood B, Valafar M, Butler K (2013) Towards secure provenance-based access control in cloud environments. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. ACM, pp 277–284
Huang J, Nicol D, Bobba R, Huh JH (2012) A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, pp 187–196
Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control, ACM
Khamadja S, Adi K, Logrippo L (2013) Designing flexible access control models for the cloud. In: Proceedings of the 6th International Conference on Security of Information and Networks, pages 225–232 ACM
Zhu J, Wen Q (2012) Saas access control research based on ucon. In: 2012 Fourth International Conference on Digital Home (ICDH). IEEE, pp 331–334
Khamadja S, Adi K, Logrippo L (2013) An access control framework for hybrid policies. In: Proceedings of the 6th International Conference on Security of Information and Networks. ACM, pp 282–286
Yuan E, Jin T (2005) Attributed based access control (abac) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS). IEEE
UllahSXuefengZFengZTcloud: A dynamic framework and policies for access control across multiple domains in cloud computingInt J Comput Appl20136220107
Godik Simon, Anderson Anne, Parducci B, et al. (2002) Oasis extensible access control markup language (XACML) 3. Technical report, Technical Representative. OASIS
Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, pp 523– 528
Mchumo S, Chi H (2010) A framework for access control model in enterprise healthcare via saml. In: Proceedings of the 48th Annual Southeast Regional Conference. ACM, p 113
Zhang Y, Chen JL (2012) Access control as a service for public cloud storage. In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, pp 526– 536
Smith M, Barton M, Bass M, Branschofsky M, McClellan G, Stuve D, Tansley R, Walker JH (2003) Dspace: An open source dynamic digital repository. Corporation for National Research Initiatives
Hansmann U (2003) Pervasive computing: The mobile world. Springer
YounisYAKifayatKMerabtiMAn access control model for cloud computingJournal of Information Security and Applications2014191456010.1016/j.jisa.2014.04.003
Almutairi A, Sarfraz M, Basalamah S, Aref W, Ghafoor A (2011) A distributed access control architecture for cloud computing. IEEE
BakerPHSecurity Assertions Markup LanguageMay200114124
Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of Cryptography and Security. Springer, pp 756–758
Rissanen E eXtensible Access Control Markup Language (XACML) version 3.0 (committe specification 01). In Technical report, OASIS, http://docs.oasisopen.org/xacml/3.0/xacml-3.0-core-spec-cd-03-en.pdf
Mao Y, Junqueira FP, Marzullo K (2008) Mencius: Building efficient replicated state machines for wans. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation OSDI’08,. USENIX Association, Berkeley, CA, pp 369–384
Gouglidis A (2011) Towards new access control models for cloud computing systems. Kaspersky
Li XY, Shi Y, Guo Y, Ma W (2010) Multi-tenancy based access control in cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE , pp 1–4
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM. IEEE, pp 1–9
Sirisha A, Kumari GG (2010) API access control in cloud using the role based access control model. In: Trendz in Information Sciences & Computing (TISC), 2010. IEEE, pp 135–137
Lazouski A, Mancini G, Martinelli F, Mori P (2012) Usage control in cloud systems. In: 2012 International Conference for Internet Technology And Secured Transactions. IEEE, pp 202–207
Masood R, Awais Shibli M, Bilal M, et al. (2012) Usage control model specification in XACML policy language. In: Computer Information Systems and Industrial Management. Springer, pp 68–79
Popa L, Minlan Y, Ko SY, Ratnasamy S, Stoica I (2010) Cloudpolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, p 7
Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 89–96
Lang U (2010) Openpmf scaas: Authorization as a service for cloud & soa applications. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 634–643
Ferraiolo D, Cugini J, Kuhn DR (1995) Role-based access control (RBAC): Features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp 241–48
ShiJZhuHA fine-grained access control model for relational databasesJ Zhejiang Univ Sci C201011857558610.1631/jzus.C0910466
MasoodRShibliMACloud authorization: exploring techniques and approach towards effective access control frameworkFrontiers of Computer Science201592297321332435410.1007/s11704-014-3160-4
Costabello L, Villata S, Delaforge N, Gandon F (2012) Shi3ld: an access control framework for the mobile web of data. In: Proceedings of the 23rd ACM Conference on Hypertext and Social Media. ACM, pp 311–312
Gamma E, Beck K (2006) Junit
Tang Z, Wei J, Sallam A, Li K, Li R (2012) A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing. Springer, pp 279–288
Ghazia U, Masood R, Awais Shibli M (2012) Comparative analysis of access control systems on the cloud. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD). IEEE, pp 41–46
Rashwand S, Mišić J (2010) A novel access control framework for secure pervasive computing. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. ACM, pp 829–833
Majumder A, Namasudra S, Nath S (2014) Taxonomy and classification of access control models for cloud environments. In: Continued Rise of the Cloud. Springer, pp 23–53
GitHub wso2 (2016) WSO2 Balana Implementation
Amir Y, Coan B, Kirsch J, Lane J (2007) Customizable fault tolerance forwide-area replication. In: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, SRDS ’07. IEEE Computer Society, Washington, DC, pp 65–82
FerraioloDAtluriVGavrilaSThe policy machine: a novel architecture and framework for access control policy specification and enforcementJ Syst Archit201157441242410.1016/j.sysarc.2010.04.005
Mon EE, Naing TT (2011) The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 4th International Conference on Broadband Network and Multimedia Technology (IC-BNMT). IEEE, pp 447– 451
Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. ACM, pp 57–64
548_CR9
548_CR8
548_CR7
548_CR6
548_CR5
548_CR18
548_CR19
548_CR36
548_CR15
548_CR16
548_CR17
548_CR39
J Shi (548_CR10) 2010; 11
548_CR32
548_CR11
548_CR33
548_CR12
S Ullah (548_CR34) 2013; 62
548_CR35
548_CR30
548_CR31
YA Younis (548_CR14) 2014; 19
548_CR29
548_CR25
548_CR26
R Masood (548_CR13) 2015; 9
548_CR27
548_CR28
D Ferraiolo (548_CR37) 2011; 57
548_CR4
548_CR21
548_CR43
548_CR3
548_CR22
548_CR2
548_CR23
548_CR1
548_CR24
548_CR40
PH Baker (548_CR38) 2001; 14
548_CR41
548_CR20
548_CR42
References_xml – reference: Zhu J, Wen Q (2012) Saas access control research based on ucon. In: 2012 Fourth International Conference on Digital Home (ICDH). IEEE, pp 331–334
– reference: BakerPHSecurity Assertions Markup LanguageMay200114124
– reference: Mon EE, Naing TT (2011) The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 4th International Conference on Broadband Network and Multimedia Technology (IC-BNMT). IEEE, pp 447– 451
– reference: Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 89–96
– reference: Ghazia U, Masood R, Awais Shibli M (2012) Comparative analysis of access control systems on the cloud. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD). IEEE, pp 41–46
– reference: Zhang Y, Chen JL (2012) Access control as a service for public cloud storage. In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, pp 526– 536
– reference: Rissanen E eXtensible Access Control Markup Language (XACML) version 3.0 (committe specification 01). In Technical report, OASIS, http://docs.oasisopen.org/xacml/3.0/xacml-3.0-core-spec-cd-03-en.pdf
– reference: Sirisha A, Kumari GG (2010) API access control in cloud using the role based access control model. In: Trendz in Information Sciences & Computing (TISC), 2010. IEEE, pp 135–137
– reference: GitHub wso2 (2016) WSO2 Balana Implementation
– reference: Rashwand S, Mišić J (2010) A novel access control framework for secure pervasive computing. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. ACM, pp 829–833
– reference: Tang Z, Wei J, Sallam A, Li K, Li R (2012) A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing. Springer, pp 279–288
– reference: Yuan E, Jin T (2005) Attributed based access control (abac) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS). IEEE
– reference: Lazouski A, Mancini G, Martinelli F, Mori P (2012) Usage control in cloud systems. In: 2012 International Conference for Internet Technology And Secured Transactions. IEEE, pp 202–207
– reference: Popa L, Minlan Y, Ko SY, Ratnasamy S, Stoica I (2010) Cloudpolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, p 7
– reference: Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. ACM, pp 57–64
– reference: MasoodRShibliMACloud authorization: exploring techniques and approach towards effective access control frameworkFrontiers of Computer Science201592297321332435410.1007/s11704-014-3160-4
– reference: Smith M, Barton M, Bass M, Branschofsky M, McClellan G, Stuve D, Tansley R, Walker JH (2003) Dspace: An open source dynamic digital repository. Corporation for National Research Initiatives
– reference: Costabello L, Villata S, Delaforge N, Gandon F (2012) Shi3ld: an access control framework for the mobile web of data. In: Proceedings of the 23rd ACM Conference on Hypertext and Social Media. ACM, pp 311–312
– reference: ShiJZhuHA fine-grained access control model for relational databasesJ Zhejiang Univ Sci C201011857558610.1631/jzus.C0910466
– reference: Lang U (2010) Openpmf scaas: Authorization as a service for cloud & soa applications. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 634–643
– reference: Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, pp 523– 528
– reference: Bates A, Mood B, Valafar M, Butler K (2013) Towards secure provenance-based access control in cloud environments. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. ACM, pp 277–284
– reference: Hansmann U (2003) Pervasive computing: The mobile world. Springer
– reference: Godik Simon, Anderson Anne, Parducci B, et al. (2002) Oasis extensible access control markup language (XACML) 3. Technical report, Technical Representative. OASIS
– reference: Majumder A, Namasudra S, Nath S (2014) Taxonomy and classification of access control models for cloud environments. In: Continued Rise of the Cloud. Springer, pp 23–53
– reference: Ferraiolo D, Cugini J, Kuhn DR (1995) Role-based access control (RBAC): Features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp 241–48
– reference: YounisYAKifayatKMerabtiMAn access control model for cloud computingJournal of Information Security and Applications2014191456010.1016/j.jisa.2014.04.003
– reference: Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM. IEEE, pp 1–9
– reference: Khamadja S, Adi K, Logrippo L (2013) Designing flexible access control models for the cloud. In: Proceedings of the 6th International Conference on Security of Information and Networks, pages 225–232 ACM
– reference: Almutairi A, Sarfraz M, Basalamah S, Aref W, Ghafoor A (2011) A distributed access control architecture for cloud computing. IEEE
– reference: Gouglidis A (2011) Towards new access control models for cloud computing systems. Kaspersky
– reference: FerraioloDAtluriVGavrilaSThe policy machine: a novel architecture and framework for access control policy specification and enforcementJ Syst Archit201157441242410.1016/j.sysarc.2010.04.005
– reference: Li XY, Shi Y, Guo Y, Ma W (2010) Multi-tenancy based access control in cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE , pp 1–4
– reference: Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control, ACM
– reference: Mchumo S, Chi H (2010) A framework for access control model in enterprise healthcare via saml. In: Proceedings of the 48th Annual Southeast Regional Conference. ACM, p 113
– reference: Khamadja S, Adi K, Logrippo L (2013) An access control framework for hybrid policies. In: Proceedings of the 6th International Conference on Security of Information and Networks. ACM, pp 282–286
– reference: Masood R, Awais Shibli M, Bilal M, et al. (2012) Usage control model specification in XACML policy language. In: Computer Information Systems and Industrial Management. Springer, pp 68–79
– reference: Huang J, Nicol D, Bobba R, Huh JH (2012) A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, pp 187–196
– reference: Gamma E, Beck K (2006) Junit
– reference: Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of Cryptography and Security. Springer, pp 756–758
– reference: Mao Y, Junqueira FP, Marzullo K (2008) Mencius: Building efficient replicated state machines for wans. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation OSDI’08,. USENIX Association, Berkeley, CA, pp 369–384
– reference: Amir Y, Coan B, Kirsch J, Lane J (2007) Customizable fault tolerance forwide-area replication. In: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, SRDS ’07. IEEE Computer Society, Washington, DC, pp 65–82
– reference: UllahSXuefengZFengZTcloud: A dynamic framework and policies for access control across multiple domains in cloud computingInt J Comput Appl20136220107
– ident: 548_CR2
  doi: 10.1007/978-3-642-30767-6_24
– ident: 548_CR7
  doi: 10.1145/507721.507722
– ident: 548_CR19
  doi: 10.1109/ICBNMT.2011.6155974
– ident: 548_CR24
  doi: 10.1109/CISE.2010.5677061
– ident: 548_CR22
– ident: 548_CR8
  doi: 10.1109/ICWS.2005.25
– volume: 14
  start-page: 1
  year: 2001
  ident: 548_CR38
  publication-title: May
– ident: 548_CR33
– volume: 9
  start-page: 297
  issue: 2
  year: 2015
  ident: 548_CR13
  publication-title: Frontiers of Computer Science
  doi: 10.1007/s11704-014-3160-4
– ident: 548_CR23
  doi: 10.1109/INFCOM.2010.5462174
– ident: 548_CR12
– ident: 548_CR9
  doi: 10.1109/CloudCom.2010.44
– ident: 548_CR35
  doi: 10.1145/1900008.1900154
– ident: 548_CR17
  doi: 10.1109/TISC.2010.5714624
– ident: 548_CR20
  doi: 10.1145/2435349.2435389
– ident: 548_CR39
– ident: 548_CR6
  doi: 10.1145/507711.507722
– volume: 19
  start-page: 45
  issue: 1
  year: 2014
  ident: 548_CR14
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2014.04.003
– ident: 548_CR41
  doi: 10.1045/january2003-smith
– ident: 548_CR42
– ident: 548_CR40
– ident: 548_CR21
– ident: 548_CR27
  doi: 10.1145/2295136.2295170
– ident: 548_CR26
  doi: 10.1109/ICDH.2012.50
– ident: 548_CR16
  doi: 10.1109/MS.2011.153
– ident: 548_CR30
  doi: 10.1145/2523514.2527005
– ident: 548_CR4
  doi: 10.1007/978-1-4471-6452-4_2
– volume: 11
  start-page: 575
  issue: 8
  year: 2010
  ident: 548_CR10
  publication-title: J Zhejiang Univ Sci C
  doi: 10.1631/jzus.C0910466
– ident: 548_CR28
  doi: 10.1145/2523514.2523549
– ident: 548_CR36
  doi: 10.1145/2309996.2310049
– ident: 548_CR31
  doi: 10.1145/2484313.2484383
– ident: 548_CR15
  doi: 10.1109/CloudCom.2010.13
– ident: 548_CR43
  doi: 10.1109/SRDS.2007.40
– ident: 548_CR3
– volume: 62
  start-page: 01
  issue: 2
  year: 2013
  ident: 548_CR34
  publication-title: Int J Comput Appl
– ident: 548_CR5
– ident: 548_CR11
– ident: 548_CR1
– ident: 548_CR29
  doi: 10.1007/978-1-4419-5906-5_784
– ident: 548_CR32
  doi: 10.1145/1815396.1815587
– ident: 548_CR18
  doi: 10.1109/ICDCSW.2012.65
– volume: 57
  start-page: 412
  issue: 4
  year: 2011
  ident: 548_CR37
  publication-title: J Syst Archit
  doi: 10.1016/j.sysarc.2010.04.005
– ident: 548_CR25
  doi: 10.1145/1868447.1868454
SSID ssj0060755
Score 2.070075
Snippet The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 307
SubjectTerms Access control
Circuits
Cloud computing
Communications Engineering
Computer Communication Networks
Consumers
Customization
Engineering
Extensibility
Information and Communication
Information Systems and Communication Service
Monitoring
Networks
R & D/Technology Policy
Security management
Signal,Image and Speech Processing
Software services
Software-as-a-service
Title EACF: extensible access control framework for cloud environments
URI https://link.springer.com/article/10.1007/s12243-016-0548-1
https://www.proquest.com/docview/1900553031
Volume 72
WOSCitedRecordID wos000401762500007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1958-9395
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0060755
  issn: 0003-4347
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JSwMxFA5SPejBXaxWycGTMtBJJsnEk6W0eCriRm9DtgGhtNJO_f2-pBNbRQU9zSELw8vyvpe3fAhdkJxZVVLYvJp6A8WIRBOZJ46ojFuqMmt1IJsQg0E-HMq7Oo97FqPdo0sy3NTLZDfQNj72ByxggNkJmDzroO1yz9dw__Acr18OOpBFmryMZiK6Mr-b4rMyWiLML07RoGv6O__6y120XUNL3FnshT205sb7aGul4OABuul1uv1rHF6-4SyMHFaBMBHXEeu4jLFaGMAsNqPJ3OLVXLhD9NTvPXZvk5pDITGUySoBI7G03FgB2EbnxCjunIMzTo0mwqS25EpJIxSgvFSrTKYGDGYGH6vbmkpHj1BjPBm7Y4R9QJzLHRGalRmzVjptpdIq5cRalvImakdhFqYuMO55LkbFsjSyF07hg8q8cIq0iS4_hrwuqmv81rkVV6ioD9qsADzT9sxHFJqv4oqsNP802cmfep-iTeLVeXh9aaFGNZ27M7Rh3qqX2fQ87L93FfjTvA
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB6kCurBt1itmoMnZaGb7CueLKWlYi2iVXpb8loolFb68Pc72W5sFRX0tIc8WCYzmW8yL4ALmoRaZAyZVzJroKjYk5QnnqEiiDQTgdYybzYRdzpJr8cfijzuiYt2dy7J_KZeJLuhtrGxP2gBI8z20ORZDVBh2YL5j08v7vqNUAeGrk1ewILYuTK_2-KzMlogzC9O0VzXNLf_9Zc7sFVAS1Kb88IurJjhHmwuFRzch5tGrd68JvnLN8rCwBCRN0wkRcQ6yVysFkEwS9RgNNNkORfuAJ6bjW695RU9FDzFQj710EjMdKR0jNhGJlSJyBiDMs6UpLHydRYJwVUsEOX5UgTcV2gwh_jRsioZN-wQSsPR0BwBsQFxJjE0lmEWhFpzIzUXUvgR1Tr0ozJUHTFTVRQYt30uBumiNLIlTmqDyixxUr8Mlx9LXufVNX6bXHEnlBaCNkkRz1Rt5yOGw1fuRJaGf9rs-E-zz2G91b1vp-3bzt0JbFCr2vOXmAqUpuOZOYU19TbtT8ZnOS--AwwH1qA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFA6iIvrgXZxOzYNPStmaNG3jk2OuKMoYeGFvJbeCMLqxdf5-T7rGTVFBfOpD0lCSnJ7vJN85H0LnJGZaZBQ2r6Q2QFGRJwmPPUNEEGoqAq1lKTYRdbtxv897lc7pxLHd3ZXkLKfBVmnKi8ZIZ4154ht4HssDgmgYILcH4c9KYHn0Nlx_fHG_4hD8IXOSeQENInet-d0Qnx3THG1-uSAt_U6y9e8v3kabFeTErdke2UFLJt9FGwuFCPfQdafVTq5weSIONjIwWJRCirhisuPMcbgwgFysBsOpxos5cvvoOek8tW-9SlvBU5TxwoPgMdOh0hFgHhkTJUJjDNg-VZJEytdZKARXkQD050sRcF9BIM3goWVTUm7oAVrOh7k5RNgS5UxsSCRZFjCtuZGaCyn8kGjN_LCGmm5iU1UVHrf6F4N0XjLZTk5qyWZ2clK_hi4-XhnNqm781rnuViutDHCSAs5pWkUkCs2XbnUWmn8a7OhPvc_QWu8mSR_uuvfHaJ1Yj18e0NTRcjGemhO0qt6K18n4tNyW74PE34Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=EACF%3A+extensible+access+control+framework+for+cloud+environments&rft.jtitle=Annales+des+t%C3%A9l%C3%A9communications&rft.au=Mehak%2C+Faria&rft.au=Masood%2C+Rahat&rft.au=Shibli%2C+Muhammad+Awais&rft.au=Elgedway%2C+Islam&rft.date=2017-06-01&rft.issn=0003-4347&rft.eissn=1958-9395&rft.volume=72&rft.issue=5-6&rft.spage=307&rft.epage=323&rft_id=info:doi/10.1007%2Fs12243-016-0548-1&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s12243_016_0548_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0003-4347&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0003-4347&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0003-4347&client=summon