Please use this identifier to cite or link to this item: https://idr.l2.nitk.ac.in/jspui/handle/123456789/6940
Full metadata record
DC FieldValueLanguage
dc.contributor.authorThomas, M.V.
dc.contributor.authorSekaran, K.C.
dc.date.accessioned2020-03-30T09:46:27Z-
dc.date.available2020-03-30T09:46:27Z-
dc.date.issued2013
dc.identifier.citationProceedings - 2013 3rd International Conference on Advances in Computing and Communications, ICACC 2013, 2013, Vol., , pp.363-366en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/6940-
dc.description.abstractIn the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed. � 2013 IEEE.en_US
dc.titleWorkflow model for distributed access controlen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.