Art
J-GLOBAL ID:202102255189775787   Reference number:21A1117314

Risk-Based Access Control Model: A Systematic Literature Review

リスクベースアクセス制御モデル:系統的文献レビュー【JST・京大機械翻訳】
Author (7):
Material:
Volume: 12  Issue:Page: 103  Publication year: 2020 
JST Material Number: U7190A  ISSN: 1999-5903  Document type: Article
Article type: 文献レビュー  Country of issue: Switzerland (CHE)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
Most current access control mo...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=21A1117314&from=J-GLOBAL&jstjournalNo=U7190A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (1):
JST classification
Category name(code) classified by JST.
Data protection 
Reference (59):
  • Dos Santos, D.R.; Westphall, C.M.; Westphall, C.B. A dynamic risk-based access control architecture for cloud computing. In Proceedings of the IEEE/IFIP NOMS 2014-IEEE/IFIP Network Operation and Managment Symposioum, Krakow, Poland, 5-9 May 2014; pp. 1-9.
  • Liu, J.K.; Au, M.H.; Huang, X.; Lu, R.; Li, J. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Trans. Inf. Forensics Secur. 2016, 11, 484-497.
  • Suhendra, V. A Survey on Access Control Deployment. In Communications in Computer and Information Science; Kim, T., Adeli, H., Fang, W., Villalba, J.G., Arnett, K.P., Khan, M.K., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; Volume 259, pp. 11-20.
  • Chen, P.; Pankaj, C.; Karger, P.A.; Wagner, G.M.; Schuett, A. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Ouckland, CA, USA, 20-23 May 2007; pp. 222-227.
  • Shaikh, R.A.; Adi, K.; Logrippo, L. Dynamic risk-based decision methods for access control systems. Comput. Secur. 2012, 31, 447-464.
more...
Terms in the title (2):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page