A Modified Things Role Based Access Control Model for Securing Utilities in Cloud Computing

Download Now
Provided by: International Journal of Innovative Research in Information Security (IJIRIS)
Topic: Hardware
Format: PDF
Cloud computing introduces a radical change in computer resources services that may become the best service provider at a reduced cost to the users. In spite of all the advantages of cloud computing, there are a lots of security challenges that come with its implementation. In overcoming these challenges, there are many access control models proposed in literature; these include discretionary access control, mandatory access control and role based access control. Role based access control models use role hierarchies and constraints. Administrative roles can be designated to manage other roles.
Download Now

Find By Topic