EACF: extensible access control framework for cloud environments
The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing fea...
Saved in:
| Published in: | Annales des télécommunications Vol. 72; no. 5-6; pp. 307 - 323 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Paris
Springer Paris
01.06.2017
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0003-4347, 1958-9395 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing features such as generality, extensibility, and flexibility. Secondly, they are static in nature, such that once the user is authorized, they do not evaluate the access request during and after the resource usage. Every application hosted in the cloud has its own requirement of evaluating access request; some applications require request evaluation before assigning resources, while some require continuous monitoring of resource usage along with a dynamic update of attribute values. To address these diverse requirements, we present an Extensible Access Control Framework (EACF) for cloud-based applications, which provides high-level extensibility by incorporating different access control models about the needs of the Cloud service consumers (organizations). A number of access control models are combined in the EACF, which provides reliable authorization service for managing and controlling access to the software as a service-hosted cloud applications.It also helps cloud consumers to provide authorized access to resources (data), as well as contributes to eliminate the need to write customized security code for individual applications. As a case study, three access control models are incorporated into the framework and tested on SaaS-hosted application DSpace to ascertain that the proposed features are functional and working fine. |
|---|---|
| AbstractList | The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing features such as generality, extensibility, and flexibility. Secondly, they are static in nature, such that once the user is authorized, they do not evaluate the access request during and after the resource usage. Every application hosted in the cloud has its own requirement of evaluating access request; some applications require request evaluation before assigning resources, while some require continuous monitoring of resource usage along with a dynamic update of attribute values. To address these diverse requirements, we present an Extensible Access Control Framework (EACF) for cloud-based applications, which provides high-level extensibility by incorporating different access control models about the needs of the Cloud service consumers (organizations). A number of access control models are combined in the EACF, which provides reliable authorization service for managing and controlling access to the software as a service-hosted cloud applications.It also helps cloud consumers to provide authorized access to resources (data), as well as contributes to eliminate the need to write customized security code for individual applications. As a case study, three access control models are incorporated into the framework and tested on SaaS-hosted application DSpace to ascertain that the proposed features are functional and working fine. |
| Author | Mehak, Faria Elgedway, Islam Shibli, Muhammad Awais Masood, Rahat |
| Author_xml | – sequence: 1 givenname: Faria surname: Mehak fullname: Mehak, Faria organization: School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST) – sequence: 2 givenname: Rahat surname: Masood fullname: Masood, Rahat email: rahat.masood@student.unsw.edu.au organization: School of Electrical Engineering and Telecommunications (EE&T), University of New South Wales (UNSW) – sequence: 3 givenname: Muhammad Awais surname: Shibli fullname: Shibli, Muhammad Awais organization: VisionIT – sequence: 4 givenname: Islam surname: Elgedway fullname: Elgedway, Islam organization: Middle East Technical University (METU), Northern Cyprus Campus |
| BookMark | eNp9kD1PwzAURS1UJNrCD2CLxGx4juM4ZqKqWkCqxAKz5TgvKCW1i53y8e9JFAaEBNNd7nkfZ0Ymzjsk5JzBJQOQV5GlacYpsJyCyArKjsiUKVFQxZWYkCkAcJrxTJ6QWYxbgBykEFNys1os19cJfnToYlO2mBhrMcbEetcF3yZ1MDt89-ElqX1IbOsPVYLurQne7dB18ZQc16aNePadc_K0Xj0u7-jm4fZ-udhQy4XqqJJFXeW2kpCKskityRGRg-C2TKVlVZ0bo6w0nAErTaaYhSwXfVQllFwhn5OLce4--NcDxk5v_SG4fqVmCkAIDpz1LTm2bPAxBqy1bTrTNcMzpmk1Az3o0qMu3evSgy49kOwXuQ_NzoTPf5l0ZGLfdc8Yftz0J_QFmHd-Rw |
| CitedBy_id | crossref_primary_10_1007_s12243_017_0578_3 |
| Cites_doi | 10.1007/978-3-642-30767-6_24 10.1145/507721.507722 10.1109/ICBNMT.2011.6155974 10.1109/CISE.2010.5677061 10.1109/ICWS.2005.25 10.1007/s11704-014-3160-4 10.1109/INFCOM.2010.5462174 10.1109/CloudCom.2010.44 10.1145/1900008.1900154 10.1109/TISC.2010.5714624 10.1145/2435349.2435389 10.1145/507711.507722 10.1016/j.jisa.2014.04.003 10.1045/january2003-smith 10.1145/2295136.2295170 10.1109/ICDH.2012.50 10.1109/MS.2011.153 10.1145/2523514.2527005 10.1007/978-1-4471-6452-4_2 10.1631/jzus.C0910466 10.1145/2523514.2523549 10.1145/2309996.2310049 10.1145/2484313.2484383 10.1109/CloudCom.2010.13 10.1109/SRDS.2007.40 10.1007/978-1-4419-5906-5_784 10.1145/1815396.1815587 10.1109/ICDCSW.2012.65 10.1016/j.sysarc.2010.04.005 10.1145/1868447.1868454 |
| ContentType | Journal Article |
| Copyright | Institut Mines-Télécom and Springer-Verlag France 2016 Copyright Springer Science & Business Media 2017 |
| Copyright_xml | – notice: Institut Mines-Télécom and Springer-Verlag France 2016 – notice: Copyright Springer Science & Business Media 2017 |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s12243-016-0548-1 |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1958-9395 |
| EndPage | 323 |
| ExternalDocumentID | 10_1007_s12243_016_0548_1 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .86 .VR 06D 07C 0R~ 0VY 1N0 2.D 203 23M 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 406 408 40D 40E 5GY 5VS 67Z 6J9 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADQRH ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCEE ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA CAG COF CSCUP DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 H13 HF~ HG5 HG6 HMJXF HRMNR HVGLF HZ~ IJ- IKXTQ IWAJR IXC IXD IZQ I~X I~Z J-C J0Z JBSCW JZLTJ KOV LLZTM M4Y MA- N2Q N9A NB0 NDZJH NF0 NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J P19 P2P P9P PF0 PT4 PT5 QOK QOS R89 R9I RHV RNI RNS ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 WK8 YLTOR Z45 Z7R Z7X Z7Y Z7Z Z83 Z88 Z8M Z8R Z8T Z8W Z92 _50 AAPKM AAYXX ABBRH ABDBE ABFSG ABJCF ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AGQPQ AHPBZ AHWEU AIXLP ARAPS ATHPR AYFIA BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS JQ2 |
| ID | FETCH-LOGICAL-c359t-978fd6cd7025b82ca6eee3053cb27c1df6aa9c7a3101ba491c046591cdb0b39e3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000401762500007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0003-4347 |
| IngestDate | Wed Sep 17 13:50:50 EDT 2025 Sat Nov 29 06:34:55 EST 2025 Tue Nov 18 22:28:57 EST 2025 Fri Feb 21 02:32:55 EST 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5-6 |
| Keywords | Authorization Fine-grained access control Software-as-a-service Cloud computing Extensible access control markup language Access control-as-a-service Usage-based access control Attribute-based access control |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c359t-978fd6cd7025b82ca6eee3053cb27c1df6aa9c7a3101ba491c046591cdb0b39e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://hdl.handle.net/11511/67809 |
| PQID | 1900553031 |
| PQPubID | 2043972 |
| PageCount | 17 |
| ParticipantIDs | proquest_journals_1900553031 crossref_citationtrail_10_1007_s12243_016_0548_1 crossref_primary_10_1007_s12243_016_0548_1 springer_journals_10_1007_s12243_016_0548_1 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-06-01 |
| PublicationDateYYYYMMDD | 2017-06-01 |
| PublicationDate_xml | – month: 06 year: 2017 text: 2017-06-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Paris |
| PublicationPlace_xml | – name: Paris – name: Heidelberg |
| PublicationTitle | Annales des télécommunications |
| PublicationTitleAbbrev | Ann. Telecommun |
| PublicationYear | 2017 |
| Publisher | Springer Paris Springer Nature B.V |
| Publisher_xml | – name: Springer Paris – name: Springer Nature B.V |
| References | Bates A, Mood B, Valafar M, Butler K (2013) Towards secure provenance-based access control in cloud environments. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. ACM, pp 277–284 Huang J, Nicol D, Bobba R, Huh JH (2012) A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, pp 187–196 Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control, ACM Khamadja S, Adi K, Logrippo L (2013) Designing flexible access control models for the cloud. In: Proceedings of the 6th International Conference on Security of Information and Networks, pages 225–232 ACM Zhu J, Wen Q (2012) Saas access control research based on ucon. In: 2012 Fourth International Conference on Digital Home (ICDH). IEEE, pp 331–334 Khamadja S, Adi K, Logrippo L (2013) An access control framework for hybrid policies. In: Proceedings of the 6th International Conference on Security of Information and Networks. ACM, pp 282–286 Yuan E, Jin T (2005) Attributed based access control (abac) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS). IEEE UllahSXuefengZFengZTcloud: A dynamic framework and policies for access control across multiple domains in cloud computingInt J Comput Appl20136220107 Godik Simon, Anderson Anne, Parducci B, et al. (2002) Oasis extensible access control markup language (XACML) 3. Technical report, Technical Representative. OASIS Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, pp 523– 528 Mchumo S, Chi H (2010) A framework for access control model in enterprise healthcare via saml. In: Proceedings of the 48th Annual Southeast Regional Conference. ACM, p 113 Zhang Y, Chen JL (2012) Access control as a service for public cloud storage. In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, pp 526– 536 Smith M, Barton M, Bass M, Branschofsky M, McClellan G, Stuve D, Tansley R, Walker JH (2003) Dspace: An open source dynamic digital repository. Corporation for National Research Initiatives Hansmann U (2003) Pervasive computing: The mobile world. Springer YounisYAKifayatKMerabtiMAn access control model for cloud computingJournal of Information Security and Applications2014191456010.1016/j.jisa.2014.04.003 Almutairi A, Sarfraz M, Basalamah S, Aref W, Ghafoor A (2011) A distributed access control architecture for cloud computing. IEEE BakerPHSecurity Assertions Markup LanguageMay200114124 Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of Cryptography and Security. Springer, pp 756–758 Rissanen E eXtensible Access Control Markup Language (XACML) version 3.0 (committe specification 01). In Technical report, OASIS, http://docs.oasisopen.org/xacml/3.0/xacml-3.0-core-spec-cd-03-en.pdf Mao Y, Junqueira FP, Marzullo K (2008) Mencius: Building efficient replicated state machines for wans. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation OSDI’08,. USENIX Association, Berkeley, CA, pp 369–384 Gouglidis A (2011) Towards new access control models for cloud computing systems. Kaspersky Li XY, Shi Y, Guo Y, Ma W (2010) Multi-tenancy based access control in cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE , pp 1–4 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM. IEEE, pp 1–9 Sirisha A, Kumari GG (2010) API access control in cloud using the role based access control model. In: Trendz in Information Sciences & Computing (TISC), 2010. IEEE, pp 135–137 Lazouski A, Mancini G, Martinelli F, Mori P (2012) Usage control in cloud systems. In: 2012 International Conference for Internet Technology And Secured Transactions. IEEE, pp 202–207 Masood R, Awais Shibli M, Bilal M, et al. (2012) Usage control model specification in XACML policy language. In: Computer Information Systems and Industrial Management. Springer, pp 68–79 Popa L, Minlan Y, Ko SY, Ratnasamy S, Stoica I (2010) Cloudpolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, p 7 Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 89–96 Lang U (2010) Openpmf scaas: Authorization as a service for cloud & soa applications. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 634–643 Ferraiolo D, Cugini J, Kuhn DR (1995) Role-based access control (RBAC): Features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp 241–48 ShiJZhuHA fine-grained access control model for relational databasesJ Zhejiang Univ Sci C201011857558610.1631/jzus.C0910466 MasoodRShibliMACloud authorization: exploring techniques and approach towards effective access control frameworkFrontiers of Computer Science201592297321332435410.1007/s11704-014-3160-4 Costabello L, Villata S, Delaforge N, Gandon F (2012) Shi3ld: an access control framework for the mobile web of data. In: Proceedings of the 23rd ACM Conference on Hypertext and Social Media. ACM, pp 311–312 Gamma E, Beck K (2006) Junit Tang Z, Wei J, Sallam A, Li K, Li R (2012) A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing. Springer, pp 279–288 Ghazia U, Masood R, Awais Shibli M (2012) Comparative analysis of access control systems on the cloud. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD). IEEE, pp 41–46 Rashwand S, Mišić J (2010) A novel access control framework for secure pervasive computing. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. ACM, pp 829–833 Majumder A, Namasudra S, Nath S (2014) Taxonomy and classification of access control models for cloud environments. In: Continued Rise of the Cloud. Springer, pp 23–53 GitHub wso2 (2016) WSO2 Balana Implementation Amir Y, Coan B, Kirsch J, Lane J (2007) Customizable fault tolerance forwide-area replication. In: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, SRDS ’07. IEEE Computer Society, Washington, DC, pp 65–82 FerraioloDAtluriVGavrilaSThe policy machine: a novel architecture and framework for access control policy specification and enforcementJ Syst Archit201157441242410.1016/j.sysarc.2010.04.005 Mon EE, Naing TT (2011) The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 4th International Conference on Broadband Network and Multimedia Technology (IC-BNMT). IEEE, pp 447– 451 Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. ACM, pp 57–64 548_CR9 548_CR8 548_CR7 548_CR6 548_CR5 548_CR18 548_CR19 548_CR36 548_CR15 548_CR16 548_CR17 548_CR39 J Shi (548_CR10) 2010; 11 548_CR32 548_CR11 548_CR33 548_CR12 S Ullah (548_CR34) 2013; 62 548_CR35 548_CR30 548_CR31 YA Younis (548_CR14) 2014; 19 548_CR29 548_CR25 548_CR26 R Masood (548_CR13) 2015; 9 548_CR27 548_CR28 D Ferraiolo (548_CR37) 2011; 57 548_CR4 548_CR21 548_CR43 548_CR3 548_CR22 548_CR2 548_CR23 548_CR1 548_CR24 548_CR40 PH Baker (548_CR38) 2001; 14 548_CR41 548_CR20 548_CR42 |
| References_xml | – reference: Zhu J, Wen Q (2012) Saas access control research based on ucon. In: 2012 Fourth International Conference on Digital Home (ICDH). IEEE, pp 331–334 – reference: BakerPHSecurity Assertions Markup LanguageMay200114124 – reference: Mon EE, Naing TT (2011) The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 4th International Conference on Broadband Network and Multimedia Technology (IC-BNMT). IEEE, pp 447– 451 – reference: Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 89–96 – reference: Ghazia U, Masood R, Awais Shibli M (2012) Comparative analysis of access control systems on the cloud. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD). IEEE, pp 41–46 – reference: Zhang Y, Chen JL (2012) Access control as a service for public cloud storage. In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, pp 526– 536 – reference: Rissanen E eXtensible Access Control Markup Language (XACML) version 3.0 (committe specification 01). In Technical report, OASIS, http://docs.oasisopen.org/xacml/3.0/xacml-3.0-core-spec-cd-03-en.pdf – reference: Sirisha A, Kumari GG (2010) API access control in cloud using the role based access control model. In: Trendz in Information Sciences & Computing (TISC), 2010. IEEE, pp 135–137 – reference: GitHub wso2 (2016) WSO2 Balana Implementation – reference: Rashwand S, Mišić J (2010) A novel access control framework for secure pervasive computing. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. ACM, pp 829–833 – reference: Tang Z, Wei J, Sallam A, Li K, Li R (2012) A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing. Springer, pp 279–288 – reference: Yuan E, Jin T (2005) Attributed based access control (abac) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS). IEEE – reference: Lazouski A, Mancini G, Martinelli F, Mori P (2012) Usage control in cloud systems. In: 2012 International Conference for Internet Technology And Secured Transactions. IEEE, pp 202–207 – reference: Popa L, Minlan Y, Ko SY, Ratnasamy S, Stoica I (2010) Cloudpolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, p 7 – reference: Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. ACM, pp 57–64 – reference: MasoodRShibliMACloud authorization: exploring techniques and approach towards effective access control frameworkFrontiers of Computer Science201592297321332435410.1007/s11704-014-3160-4 – reference: Smith M, Barton M, Bass M, Branschofsky M, McClellan G, Stuve D, Tansley R, Walker JH (2003) Dspace: An open source dynamic digital repository. Corporation for National Research Initiatives – reference: Costabello L, Villata S, Delaforge N, Gandon F (2012) Shi3ld: an access control framework for the mobile web of data. In: Proceedings of the 23rd ACM Conference on Hypertext and Social Media. ACM, pp 311–312 – reference: ShiJZhuHA fine-grained access control model for relational databasesJ Zhejiang Univ Sci C201011857558610.1631/jzus.C0910466 – reference: Lang U (2010) Openpmf scaas: Authorization as a service for cloud & soa applications. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 634–643 – reference: Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, pp 523– 528 – reference: Bates A, Mood B, Valafar M, Butler K (2013) Towards secure provenance-based access control in cloud environments. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. ACM, pp 277–284 – reference: Hansmann U (2003) Pervasive computing: The mobile world. Springer – reference: Godik Simon, Anderson Anne, Parducci B, et al. (2002) Oasis extensible access control markup language (XACML) 3. Technical report, Technical Representative. OASIS – reference: Majumder A, Namasudra S, Nath S (2014) Taxonomy and classification of access control models for cloud environments. In: Continued Rise of the Cloud. Springer, pp 23–53 – reference: Ferraiolo D, Cugini J, Kuhn DR (1995) Role-based access control (RBAC): Features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp 241–48 – reference: YounisYAKifayatKMerabtiMAn access control model for cloud computingJournal of Information Security and Applications2014191456010.1016/j.jisa.2014.04.003 – reference: Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM. IEEE, pp 1–9 – reference: Khamadja S, Adi K, Logrippo L (2013) Designing flexible access control models for the cloud. In: Proceedings of the 6th International Conference on Security of Information and Networks, pages 225–232 ACM – reference: Almutairi A, Sarfraz M, Basalamah S, Aref W, Ghafoor A (2011) A distributed access control architecture for cloud computing. IEEE – reference: Gouglidis A (2011) Towards new access control models for cloud computing systems. Kaspersky – reference: FerraioloDAtluriVGavrilaSThe policy machine: a novel architecture and framework for access control policy specification and enforcementJ Syst Archit201157441242410.1016/j.sysarc.2010.04.005 – reference: Li XY, Shi Y, Guo Y, Ma W (2010) Multi-tenancy based access control in cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE , pp 1–4 – reference: Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control, ACM – reference: Mchumo S, Chi H (2010) A framework for access control model in enterprise healthcare via saml. In: Proceedings of the 48th Annual Southeast Regional Conference. ACM, p 113 – reference: Khamadja S, Adi K, Logrippo L (2013) An access control framework for hybrid policies. In: Proceedings of the 6th International Conference on Security of Information and Networks. ACM, pp 282–286 – reference: Masood R, Awais Shibli M, Bilal M, et al. (2012) Usage control model specification in XACML policy language. In: Computer Information Systems and Industrial Management. Springer, pp 68–79 – reference: Huang J, Nicol D, Bobba R, Huh JH (2012) A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, pp 187–196 – reference: Gamma E, Beck K (2006) Junit – reference: Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of Cryptography and Security. Springer, pp 756–758 – reference: Mao Y, Junqueira FP, Marzullo K (2008) Mencius: Building efficient replicated state machines for wans. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation OSDI’08,. USENIX Association, Berkeley, CA, pp 369–384 – reference: Amir Y, Coan B, Kirsch J, Lane J (2007) Customizable fault tolerance forwide-area replication. In: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, SRDS ’07. IEEE Computer Society, Washington, DC, pp 65–82 – reference: UllahSXuefengZFengZTcloud: A dynamic framework and policies for access control across multiple domains in cloud computingInt J Comput Appl20136220107 – ident: 548_CR2 doi: 10.1007/978-3-642-30767-6_24 – ident: 548_CR7 doi: 10.1145/507721.507722 – ident: 548_CR19 doi: 10.1109/ICBNMT.2011.6155974 – ident: 548_CR24 doi: 10.1109/CISE.2010.5677061 – ident: 548_CR22 – ident: 548_CR8 doi: 10.1109/ICWS.2005.25 – volume: 14 start-page: 1 year: 2001 ident: 548_CR38 publication-title: May – ident: 548_CR33 – volume: 9 start-page: 297 issue: 2 year: 2015 ident: 548_CR13 publication-title: Frontiers of Computer Science doi: 10.1007/s11704-014-3160-4 – ident: 548_CR23 doi: 10.1109/INFCOM.2010.5462174 – ident: 548_CR12 – ident: 548_CR9 doi: 10.1109/CloudCom.2010.44 – ident: 548_CR35 doi: 10.1145/1900008.1900154 – ident: 548_CR17 doi: 10.1109/TISC.2010.5714624 – ident: 548_CR20 doi: 10.1145/2435349.2435389 – ident: 548_CR39 – ident: 548_CR6 doi: 10.1145/507711.507722 – volume: 19 start-page: 45 issue: 1 year: 2014 ident: 548_CR14 publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2014.04.003 – ident: 548_CR41 doi: 10.1045/january2003-smith – ident: 548_CR42 – ident: 548_CR40 – ident: 548_CR21 – ident: 548_CR27 doi: 10.1145/2295136.2295170 – ident: 548_CR26 doi: 10.1109/ICDH.2012.50 – ident: 548_CR16 doi: 10.1109/MS.2011.153 – ident: 548_CR30 doi: 10.1145/2523514.2527005 – ident: 548_CR4 doi: 10.1007/978-1-4471-6452-4_2 – volume: 11 start-page: 575 issue: 8 year: 2010 ident: 548_CR10 publication-title: J Zhejiang Univ Sci C doi: 10.1631/jzus.C0910466 – ident: 548_CR28 doi: 10.1145/2523514.2523549 – ident: 548_CR36 doi: 10.1145/2309996.2310049 – ident: 548_CR31 doi: 10.1145/2484313.2484383 – ident: 548_CR15 doi: 10.1109/CloudCom.2010.13 – ident: 548_CR43 doi: 10.1109/SRDS.2007.40 – ident: 548_CR3 – volume: 62 start-page: 01 issue: 2 year: 2013 ident: 548_CR34 publication-title: Int J Comput Appl – ident: 548_CR5 – ident: 548_CR11 – ident: 548_CR1 – ident: 548_CR29 doi: 10.1007/978-1-4419-5906-5_784 – ident: 548_CR32 doi: 10.1145/1815396.1815587 – ident: 548_CR18 doi: 10.1109/ICDCSW.2012.65 – volume: 57 start-page: 412 issue: 4 year: 2011 ident: 548_CR37 publication-title: J Syst Archit doi: 10.1016/j.sysarc.2010.04.005 – ident: 548_CR25 doi: 10.1145/1868447.1868454 |
| SSID | ssj0060755 |
| Score | 2.070075 |
| Snippet | The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 307 |
| SubjectTerms | Access control Circuits Cloud computing Communications Engineering Computer Communication Networks Consumers Customization Engineering Extensibility Information and Communication Information Systems and Communication Service Monitoring Networks R & D/Technology Policy Security management Signal,Image and Speech Processing Software services Software-as-a-service |
| Title | EACF: extensible access control framework for cloud environments |
| URI | https://link.springer.com/article/10.1007/s12243-016-0548-1 https://www.proquest.com/docview/1900553031 |
| Volume | 72 |
| WOSCitedRecordID | wos000401762500007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1958-9395 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0060755 issn: 0003-4347 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JSwMxFA5SPejBXaxWycGTMtBJJsnEk6W0eCriRm9DtgGhtNJO_f2-pBNbRQU9zSELw8vyvpe3fAhdkJxZVVLYvJp6A8WIRBOZJ46ojFuqMmt1IJsQg0E-HMq7Oo97FqPdo0sy3NTLZDfQNj72ByxggNkJmDzroO1yz9dw__Acr18OOpBFmryMZiK6Mr-b4rMyWiLML07RoGv6O__6y120XUNL3FnshT205sb7aGul4OABuul1uv1rHF6-4SyMHFaBMBHXEeu4jLFaGMAsNqPJ3OLVXLhD9NTvPXZvk5pDITGUySoBI7G03FgB2EbnxCjunIMzTo0mwqS25EpJIxSgvFSrTKYGDGYGH6vbmkpHj1BjPBm7Y4R9QJzLHRGalRmzVjptpdIq5cRalvImakdhFqYuMO55LkbFsjSyF07hg8q8cIq0iS4_hrwuqmv81rkVV6ioD9qsADzT9sxHFJqv4oqsNP802cmfep-iTeLVeXh9aaFGNZ27M7Rh3qqX2fQ87L93FfjTvA |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB6kCurBt1itmoMnZaGb7CueLKWlYi2iVXpb8loolFb68Pc72W5sFRX0tIc8WCYzmW8yL4ALmoRaZAyZVzJroKjYk5QnnqEiiDQTgdYybzYRdzpJr8cfijzuiYt2dy7J_KZeJLuhtrGxP2gBI8z20ORZDVBh2YL5j08v7vqNUAeGrk1ewILYuTK_2-KzMlogzC9O0VzXNLf_9Zc7sFVAS1Kb88IurJjhHmwuFRzch5tGrd68JvnLN8rCwBCRN0wkRcQ6yVysFkEwS9RgNNNkORfuAJ6bjW695RU9FDzFQj710EjMdKR0jNhGJlSJyBiDMs6UpLHydRYJwVUsEOX5UgTcV2gwh_jRsioZN-wQSsPR0BwBsQFxJjE0lmEWhFpzIzUXUvgR1Tr0ozJUHTFTVRQYt30uBumiNLIlTmqDyixxUr8Mlx9LXufVNX6bXHEnlBaCNkkRz1Rt5yOGw1fuRJaGf9rs-E-zz2G91b1vp-3bzt0JbFCr2vOXmAqUpuOZOYU19TbtT8ZnOS--AwwH1qA |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFA6iIvrgXZxOzYNPStmaNG3jk2OuKMoYeGFvJbeCMLqxdf5-T7rGTVFBfOpD0lCSnJ7vJN85H0LnJGZaZBQ2r6Q2QFGRJwmPPUNEEGoqAq1lKTYRdbtxv897lc7pxLHd3ZXkLKfBVmnKi8ZIZ4154ht4HssDgmgYILcH4c9KYHn0Nlx_fHG_4hD8IXOSeQENInet-d0Qnx3THG1-uSAt_U6y9e8v3kabFeTErdke2UFLJt9FGwuFCPfQdafVTq5weSIONjIwWJRCirhisuPMcbgwgFysBsOpxos5cvvoOek8tW-9SlvBU5TxwoPgMdOh0hFgHhkTJUJjDNg-VZJEytdZKARXkQD050sRcF9BIM3goWVTUm7oAVrOh7k5RNgS5UxsSCRZFjCtuZGaCyn8kGjN_LCGmm5iU1UVHrf6F4N0XjLZTk5qyWZ2clK_hi4-XhnNqm781rnuViutDHCSAs5pWkUkCs2XbnUWmn8a7OhPvc_QWu8mSR_uuvfHaJ1Yj18e0NTRcjGemhO0qt6K18n4tNyW74PE34Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=EACF%3A+extensible+access+control+framework+for+cloud+environments&rft.jtitle=Annales+des+t%C3%A9l%C3%A9communications&rft.au=Mehak%2C+Faria&rft.au=Masood%2C+Rahat&rft.au=Shibli%2C+Muhammad+Awais&rft.au=Elgedway%2C+Islam&rft.date=2017-06-01&rft.issn=0003-4347&rft.eissn=1958-9395&rft.volume=72&rft.issue=5-6&rft.spage=307&rft.epage=323&rft_id=info:doi/10.1007%2Fs12243-016-0548-1&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s12243_016_0548_1 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0003-4347&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0003-4347&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0003-4347&client=summon |