References: [1] Cloud Security Alliance Guidance Version 3.0. (2011), https://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf [2] Safiriyu, E., Olatunde, A., Ayodeji, O. (2011). A User Identity Management Protocol for Cloud Computing Paradigm, Int. J. Communications, Network and System Sciences, 2011, 4, 152-163 [3] Zhang, Xuan., Wuwong, Nattapong., Li, Hao. (2010). Information Security Risk Management Framework for the Cloud Computing Environments, 10th IEEE Int. Conf. on Computer and Information Technology CTI 2010. [4] Min, Y.G., Bang, Y. H. (2012). Cloud Computing Security Issues and Access Control Solutions, Journel of Security Engineering, volume 2, 2012. [5] Khan, A. R. (2012). Access Control in Cloud Computing Environment, ARPN Journal of Engineering and Applied Sciences, 7 (5) MAY 2012 [6] Yahya, Zeineb Ben., BarikaKtata, Farah., Ghédira, Khaled (2017). MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems. CRiSIS 2017. 101-114 [7] Ferber, J. (1999). Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence. Addison – Wesley. [8] Tang, Zhuo., Zhang, Shaohua, Li, Kenli., Feng, Benming. (2010). Security Analysis and Validation for Access Control in Multi-domain Environment based on Risk, Information Security, Practice and Experience, LNCS, Vol. 6047, 2010, p 201-206 [9] Sandhu, R. S., Samarati, P. (1994). Access controls, principles and practice. IEEE Communications Magazine, 32 (9), p40-48, 1994. [10] Wang, Z. (2011). Security and privacy issues within the cloud computing. In: 2011 International Conference on Computational and Information Sciences. IEEE; 2011. p 175e8. http://dx.doi.org/ 10.1109/ICCIS.2011.247. [11] Dan Hubbard, W., Michael Sutton, Z. (2012). Top threats to cloud computing V1.0. Cloud Security Alliance; 2010. Retrieved June 20, 2012, from, https://cloudsecurityalliance.org/topthreats/ csathreats.v1.0.pdf [12] Wang, C., Wang, Q., Ren, K., Lou, W. (2009). Ensuring data storage security in cloud computing. In: 2009 17th International Workshop on Quality of Service. IEEE; 2009. p 1e9. http://dx.doi.org/10.1 109/IWQoS.2009.5201385. [13] Subashini, S., Kavitha, V. A. (2011). Survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 2011, 34 (1) 1e11. http://dx.doi.org/10.1016/j.jnca.2010.07.006. [14] Lombardi F., Di Pietro R. (2011). Secure virtualization for cloud computing. J Netw Comput Appl 2011, 34 (4) 1113e22. http:/ / dx.doi.org/10.1016/j.jnca.2010.06.008. [15] Choudhury, AJ., Kumar, P., Sain, M., Lim, H., Jae-Lee H. (2011). A strong user authentication framework for cloud computing. In: 2011 IEEE Asia-Pacific Services Computing Conference. IEEE; 2011. p 110e5. http://dx.doi.org/10.1109/APSCC.2011.14 [16] Keromytis, AD, Smith, JM. (2007). Requirements for scalable access control and security management architectures. ACM Trans Internet Technol 2007, 7 (2) 22. http://dx.doi.org/10.1145/1239 971.1239972. [17] Crago, S., Dunn, K., Eads, P., Hochstein, L., Kang, D-I., Kang, M., et al. (2011). Heterogeneous cloud computing. In: 2011 IEEE International Conference on Cluster Computing. IEEE; 2011. p. 378e85. http://dx.doi.org/10.1109/CLUSTER.2011.49. [18] Patil, V., Mei, A., Mancini, L. (2007). Addressing interoperability issues in access control models. In: ASIACCS ’07 Proceedings of the 2nd ACM symposium on Information, computer and communications security, vol. 389-391; 2007. Retrieved from, http://dl.acm.org/citation.cfm?id¼1229337; 2007. [19] Almutairi, A., Sarfraz, M., Basalamah, S. (2012). A distributed access control architecture for cloud computing. Softw IEEE 2012, 29(2):36e44. Retrieved from, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arn umber¼6095492. [20] Hasebe, K., Mabuchi, M., Matsushita, A. (2010). Capability-based delegation model in RBAC. In: Proceeding of the 15th ACM symposium on Access control models and technologies e SACMAT ’10. New York, New York, USA: ACM Press; 2010. p 109e18. http:// dx.doi.org/10.1145/1809842.1809861. [21] Kuhn, D. F. (1992). Role-Based Access Controls. 15th National Computer Security Conference, 554 - 563. [22] Suhendra, V. (2011). A survey on access control deployment. SecurTechnol 2011, 259:11e20. Retrieved from, [23] Munawer, Q. (2000). Administrative models for role-based access control. George Mason University; 2000. Retrieved from, http://citesee rx.ist.psu.edu/viewdoc/download?doi¼10.1.1.92.9150&rep¼r ep1&type¼pdf. [24] Almutairi, M. I., Sarfraz, S., Basalamah, W. G. Aref Ghafoor, A. (2012). A Distributed Access Control Architecture for Cloud Computing, IEEE Software, 29 (2) March-April 2012 [25] Ruj, S., Nayak, A., Stojmenovic, I. (2011). DACC: Distributed Access Control in Clouds, In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p 91-98, 2011. [26] Al-Kahtani MA, Sandhu R. (2002). A model for attribute-based user-role assignment. In: 18th Annual Computer Security Applications Conference, 2002. In: Proceedings. IEEE Comput. Soc.; 2002, 353e62. http://dx.doi.org/10.1109/CSAC.2002.1176307. [27] Karp, A., Haury, H., Davis, M. (2009). From ABAC to ZBAC: the evolution of access control models. HP Laboratories-2009- 30; 2009. Retrieved from, http://www.hpl.hp.com/techreports/2009/HP L-2009-30.pdf?jumpid¼reg_R1002_USEN. [28] Brucker, A., Bru¨ gger, L., Kearney, P., Wolff , B. (2011). An approach to modular and testable security models of real-world health-care applications. In: SACMAT’11. Proceedings of the 16th ACM symposium on Access Control Models and Technologies.133e42. Retrieved from, http://dl.acm.org/citation.cfm? id¼1998461; 2011; [29] Suhendra V. (2011). A survey on access control deployment. SecurTechnol 2011; 259:11e20. Retrieved from, http://www.spring erlink.com/index/J31010242555W867.pdf. [30] Varsha, D., Mali, Patil, Pramod. (2011). Authentication and Access Control for Cloud Computing using RBDAC Mechanism, International Journal of Innovative Research in Computer and Communication Engineering, 4 (11), November 20 16, DOI: 10.15680/IJIRCCE. 2 016 [31] Shantanu Pal, Khatua, Sunirmal., Chaki, Nabendu., Sanyal, Sugata(2012). A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security; Annals of Faculty Engineering Hunedoara International Journal of Engineering; 10 (1) February, 2012. p 71-78. ISSN: 1584-2665. [32] Almenarez, Florina., Marin, Andrés., Campo, Celeste., Carlos. (2004). PTM: A Pervasive Trust Management Model for Dynamic Open Environments, Proceedings of First Workshop on Pervasive Security, Privacy and Trust PSPT’04, Boston, USA, 2004. [33] Priyank, S., Ranjita, S., Mukul, S. (2011). Security Agents: A Mobile Agent based Trust Model for Cloud Computing, International Journal of Computer Applications (0975 – 8887) 36 (12) December 2011. [34] Alwesabi, A., Okba, K. (2014). Security Method: Cloud Computing Approach Based on Mobile Agents. International Journal of New Computer Architectures and their Applications (IJNCAA), 4 (1) 17- 29. [35] Ali, Alwesabi., Abdullah, Almutewekel. (2013). Implementation of Cloud Computing Approach Based on Mobile Agents,”.Computer science department, university of Batna, Algeria Batna, Algeria, International Journal of Computer and Information Technology (ISSN: 2279 – 0764) 02 (06) November 2013 [36] Standard, Nist-Fips. (2001). Announcing the ADVANCED ENCRY PTION STANDARD (AES), Federal Information Processing Standards Publication 197, NIST, 2001. [37] Li, W., Wan, H. (2012). A refined RBAC model for cloud computing. In: 2012 IEEE/ACIS 11th International Conference on Computer and Information Science. IEEE; 2012. p 43e8. http://dx.doi.org/ 10.1109/ICIS.2012.13. [38] Andal Jayaprakash, H., HadiGunes, M. (2011). Ensuring access control in cloud provisioned healthcare systems. In: Consumer Communications and Networking Conference (CCNC), 2011 IEEE. p 247e51. Retrieved from, http://ieeexplore.ieee.org/ xpls/abs_all.jsp?arnumber¼5766466; 2011. [39] Tsai, W-T, Shao, Q. (2011). Role-based access-control using reference ontology in clouds. In: 2011 Tenth International Symposium on Autonomous Decentralized Systems, vol. 2. IEEE; 2011. p 121e8. http://dx.doi.org/10.1109/ISADS.2011.21 |