• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Li, Xiaohui (Li, Xiaohui.) | He, Jingsha (He, Jingsha.) (Scholars:何泾沙) | Zhang, Ting (Zhang, Ting.)

Indexed by:

EI Scopus

Abstract:

Cloud computing is the next generation of platform over which information and services can be offered to the user in a more convenient and transparent way. On the other hand, however, commercial interests will cause information proliferation, resulting in over-supply of useless information to the user and waste of precious systems and network resources. The problem of controlling such information proliferation has thus received a great deal of interests in recent years. In this paper, we propose an access control model for negative authorization to provide the user with the ability and flexibility of specifying the objects to which access is not desired through the means of negative authorization. The main contributions of this paper include: (1) the concept of negative authorization in access control; (2) negative authorization rules; and (3) specification of negative authorizations by the user. With the ability of specifying negative authorization by the user, access to unwanted information and services offered by the cloud can be disabled through access control. Compared to filtering mechanisms that block unwanted information and services, negative authorization has the advantage of saving precious computation and network resources because access control happens prior to actual access while filtering takes place after system access and network transmission.

Keyword:

Access control Data reduction Cloud computing

Author Community:

  • [ 1 ] [Li, Xiaohui]Computer Science and Technology, Beijing University of Technology, Beijing 100124, China
  • [ 2 ] [He, Jingsha]School of Software Engineering, Beijing University of Technology, Beijing 100124, China
  • [ 3 ] [Zhang, Ting]Computer Science and Technology, Beijing University of Technology, Beijing 100124, China

Reprint Author's Address:

Show more details

Related Keywords:

Related Article:

Source :

International Journal of Security and its Applications

ISSN: 1738-9976

Year: 2012

Issue: 2

Volume: 6

Page: 307-312

ESI Discipline: COMPUTER SCIENCE;

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Online/Total:525/5420539
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.