JIANG Ze-tao, XIE Zhen, WANG Qi, ZHANG Wen-hui. A Cross-Domain Access Control Model for Cloud Computing Environments[J]. Microelectronics & Computer, 2017, 34(3): 65-69.
Citation: JIANG Ze-tao, XIE Zhen, WANG Qi, ZHANG Wen-hui. A Cross-Domain Access Control Model for Cloud Computing Environments[J]. Microelectronics & Computer, 2017, 34(3): 65-69.

A Cross-Domain Access Control Model for Cloud Computing Environments

  • UCON (Usage Control) is able to cover access control, trust management and DRM (Digital Rights Management) and called the next generation access control model. However, its practical application is still in the exploratory stage because of its mandate is complex. The author removes the obligation element and splits condition element to simplify the implementation. At the same time, author puts forward three basic control modes which can meet the needs of cross-domain access control in the cloud computing environment.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return