Related links
pvm-model-survey-aug26-2009.pdf
A SURVEY OF ACCESS CONTROL MODELS. INTRODUCTION. Computer systems and the The rest of this paper discusses current and future access control modelsincluding
Learn more
A Secure Cloud Computing System by Using Encryption
by GS Mahmood Cited by 25 This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model
Learn more
A Survey on Access Control Models and Applications
This survey focuses on the growing literature of access control models and summarizes it through comparative analysis, identifying limitations and illustrating
Learn more