Access control security model based on behavior in cloud computing environment
In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access c...
Saved in:
Main Authors: | Guo-yuan LIN, Shan HE, Hao HUANG, Ji-yi WU, Wei CHEN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)03-0059-08/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Access control model based on trusted computing for integrated avionics system
by: CUI Xi-ning1, et al.
Published: (2009-01-01) -
Reconstruction of BLP model based on secure subject access
by: LIU Ke-long1, et al.
Published: (2007-01-01) -
Research of duality and multi-level security model based on intransitive noninterference theory
by: LIU Wei-peng1, et al.
Published: (2009-01-01) -
Roles query algorithm in cloud computing environment based on user require
by: YANG Liu, et al.
Published: (2011-01-01) -
Security of Cloud Computing
by: Qunying Sun, et al.
Published: (2013-04-01)