PARBAC: Priority-attribute-based RBAC model for azure IoT cloud

A Thakare, E Lee, A Kumar, VB Nikam… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Duties are segregated within a team by using the role-based access control (RBAC) in the
Azure Internet of Things (IoT) framework, and only an appropriate level of access is granted …

Mobile internet access control strategy based on trust perception

L Chen, X Zhao, R Zhao, G Yuan, S Zhang… - … Conference on Artificial …, 2022 - Springer
In recent years, the rapid development of mobile Internet services has greatly increased the
complexity of network interaction. In the mobile Internet scenario, there are higher …

[PDF][PDF] A Novel access control model in cloud computing environment (PAR-AC)

R Mahajan, M Mahajan, D Singh - International Journal of …, 2018 - researchgate.net
Cloud computing has changed the perspective of information storage worldwide; still it has
not fully matured. Security, privacy and access control of the stored data is the biggest …

Access Control Model for Data Analytics for Securing Data in Cloud Computing Environment

R Saxena, K Bala, S Sharma… - Latest Trends in …, 2024 - taylorfrancis.com
In modern days, every field of business is using data analytics methods of data science for
prediction, decision-making, trend finding, etc. For all the methods, a huge amount of data …

Automatic Conversion of ABAC Policies for RBAC Systems

M Davari, M Zulkernine - 2023 IEEE Conference on …, 2023 - ieeexplore.ieee.org
The flexibility, portability, and identity-independence of Attribute-Based Access Control
(ABAC) make it a desirable choice for various application domains. Despite these …

[PDF][PDF] Efficient Multi-Level Authentication for Cloud API based on RestPL

MJ Balachandran, P Sujatha - International Journal of Computer …, 2017 - academia.edu
Methods/Statistical Analysis: This paper detailed the ways of how efficiently authenticated
through Cloud API in Jelastic Server based on RestPL. RestPL is purely based on the …

[CITATION][C] A Critical Comparative Study and Characterisation of Access Control Model

FJ Oyeyinka, SA Idowu, A Kuyoro, JV Joshua…