TC-enabled and distributed cloud computing access control model
Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided ser...
| Main Authors: | Halboob, Waleed, Mahmod, Ramlan, Alghathbar, Khaled S., Mamat, Ali |
|---|---|
| Format: | Article |
| Published: |
Asian Network for Scientific Information
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/35600/ |
Similar Items
Trusted-based scalable access control model for broadcast XML documents.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
A distributed push-based XML access control model for better scalability
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Temporal, delegable and cheap update access control to published XML documents.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by: Jamal, Fara, et al.
Published: (2019)
by: Jamal, Fara, et al.
Published: (2019)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Intelligent Traffic Control (i-TC) for Road Construction
by: Mohd Nizam, Nurul Nazira, et al.
Published: (2020)
by: Mohd Nizam, Nurul Nazira, et al.
Published: (2020)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Comparison of uptake 99mTcO4; 99mTc-dtpa and "mTc-mdp by breast cancer cell line.
by: Rafzi, Siti Noraisyah
Published: (2015)
by: Rafzi, Siti Noraisyah
Published: (2015)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Comparison of uptake
99mTcO4; 99mTc-DTPA and 99mTc-MDP by breast cancer cell line.
by: Rafzi, Siti Noraisyah
Published: (2015)
by: Rafzi, Siti Noraisyah
Published: (2015)
Access control in open distributed systems
by: Udzir, Nur Izura, et al.
Published: (2012)
by: Udzir, Nur Izura, et al.
Published: (2012)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
Tc-99m NIDP and Tc-99m HMPAO labelled leukocyte scans in
tuberculous spondylitis
by: Mohamad, Abdul R, et al.
Published: (1999)
by: Mohamad, Abdul R, et al.
Published: (1999)
Blockchain-enabled cloud services for secure and transparent data management in SMEs
by: Ali, Abdifatah Farah, et al.
Published: (2024)
by: Ali, Abdifatah Farah, et al.
Published: (2024)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
Mobile cloud computing for emergency healthcare model:framework
by: Nirabi, Ali, et al.
Published: (2018)
by: Nirabi, Ali, et al.
Published: (2018)
Cloud Computing Delivery and Delivery Models: Opportunity and Challenges
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Cloud Computing Model for MyGRANTs Project
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
Cloud Enabled e-glossary System: A Smart Campus Perspective
by: Al-Nadwi, Musaddiq Majid Khan, et al.
Published: (2018)
by: Al-Nadwi, Musaddiq Majid Khan, et al.
Published: (2018)
Cloud enabled e-glossary system: a smart campus perspective
by: Khan, Musaddiq Majid, et al.
Published: (2018)
by: Khan, Musaddiq Majid, et al.
Published: (2018)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Minimum completion time for power-aware scheduling in cloud computing
by: Mehdi, Nawfal A., et al.
Published: (2012)
by: Mehdi, Nawfal A., et al.
Published: (2012)
Greening cloud-enabled big data storage forensics: syncany as a case study
by: Teing, Yee-Yang, et al.
Published: (2019)
by: Teing, Yee-Yang, et al.
Published: (2019)
Synthesis and Formation of T11223 and T1223 High-Tc Superconductors
by: Yahya, Ahmad Kamal, et al.
Published: (2003)
by: Yahya, Ahmad Kamal, et al.
Published: (2003)
Similar Items
-
Trusted-based scalable access control model for broadcast XML documents.
by: Halboob, Waleed, et al.
Published: (2013) -
Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
by: Halboob, Waleed, et al.
Published: (2013) -
A distributed push-based XML access control model for better scalability
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008) -
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014) -
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)