Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/6940
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Thomas, M.V. | |
dc.contributor.author | Sekaran, K.C. | |
dc.date.accessioned | 2020-03-30T09:46:27Z | - |
dc.date.available | 2020-03-30T09:46:27Z | - |
dc.date.issued | 2013 | |
dc.identifier.citation | Proceedings - 2013 3rd International Conference on Advances in Computing and Communications, ICACC 2013, 2013, Vol., , pp.363-366 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/6940 | - |
dc.description.abstract | In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed. � 2013 IEEE. | en_US |
dc.title | Workflow model for distributed access control | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.