Please use this identifier to cite or link to this item:
https://idr.l3.nitk.ac.in/jspui/handle/123456789/7219
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Thomas, M.V. | |
dc.contributor.author | Chandra, Sekaran, K. | |
dc.date.accessioned | 2020-03-30T09:58:39Z | - |
dc.date.available | 2020-03-30T09:58:39Z | - |
dc.date.issued | 2013 | |
dc.identifier.citation | Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, 2013, Vol., , pp.1628-1633 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7219 | - |
dc.description.abstract | Recently, considerable attention has been given to the emerging cloud computing paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service providers, for the successful and efficient completion of their tasks. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. Hence, the proper access control of distributed shared resources assumes high significance, as far as the secure computing paradigm is concerned. In this paper, we make an analysis of the distributed access control issue considering the various mechanisms proposed by the researchers in this area, discussing their merits and demerits. The issues and concerns in different contexts of distributed computing environments are highlighted. We propose an agent-based approach for the distributed access control in cloud environments for mediating the access requests of cloud consumers, considering the present day requirements of the cloud computing paradigm. We also give the workflow model for the proposed agent-based approach for the distributed access control in cloud. A few open issues in the area of distributed access control are also discussed. � 2013 IEEE. | en_US |
dc.title | Agent-based approach for distributed access control in cloud environments | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.