[HTML][HTML] A delegation model for SDN-driven federated cloud
A Ahmad, AS Alzahrani, N Ahmed, T Ahsan - Alexandria Engineering …, 2020 - Elsevier
The federated cloud paradigm is getting popular for its dynamic allocation of resources,
processing power, improved performance, and scalability. A federated cloud lets multiple …
processing power, improved performance, and scalability. A federated cloud lets multiple …
Taxonomy of delegation model
Protection of shared data from unauthorized users is the most challenging problem of cyber
security for which different access control models have been introduced. However, to …
security for which different access control models have been introduced. However, to …
Definition of an advanced identity management infrastructure
G Dólera Tormo, G López Millán… - International Journal of …, 2013 - Springer
In recent years, organizations are starting to demand a finer user access control in order to
offer added-value services, while end users desire more control over their private …
offer added-value services, while end users desire more control over their private …
Fine‐grained filtering to provide access control for data providing services within collaborative environments
K Brown, M Hayes, D Allison… - Concurrency and …, 2015 - Wiley Online Library
A data providing service (DPS) in service‐oriented architecture is tasked only with the
retrieval of data that are annotated over a domain ontology. One particular motivating …
retrieval of data that are annotated over a domain ontology. One particular motivating …
A capability-based access control framework with delegation support
H Shen - … , Networking and Applications: Proceedings of WCNA …, 2016 - Springer
This paper presents a capability-and policy-based access control framework with delegation
support (CPBAC) for distributed system that provides two types of delegation: administrative …
support (CPBAC) for distributed system that provides two types of delegation: administrative …
Trust and compliance management models in emerging outsourcing environments
A Pasic, J Bareño, B Gallego-Nicasio, R Torres… - Software Services for e …, 2010 - Springer
Businesses today have more than ever a sharp focus on reducing capital and operational
expenses. Business Process Outsourcing (BPO), Knowledge Process Outsourcing (KPO) …
expenses. Business Process Outsourcing (BPO), Knowledge Process Outsourcing (KPO) …
[PDF][PDF] RPPM: a relationship-based access control model utilising Relationships, Paths and Principal Matching.
J Sellwood - 2017 - pure.royalholloway.ac.uk
Since their introduction, the use (and abuse) of computer systems has grown astronomically,
and consequently so has the need to manage the sharing of data between users, processes …
and consequently so has the need to manage the sharing of data between users, processes …
GARD: Generic access rights delegation framework for collaborative environment
Delegation of access rights is becoming a common requirement of cloud based
organizations. In this regard, various delegation models have been proposed. These models …
organizations. In this regard, various delegation models have been proposed. These models …
Mobile device display of federated wireless access point networks for 5G or other next generation network
N Schenck, S Meredith, W Cottrill - US Patent 10,880,804, 2020 - Google Patents
(57) ABSTRACT Wireless fidelity (Wi-Fi) devices that are not associated with a specific
wireless carrier can be contractually operated as an extension of the specific Wi-Fi carrier. In …
wireless carrier can be contractually operated as an extension of the specific Wi-Fi carrier. In …
Application and evaluation of edge detection system employing the ADD
JG Lee, EM Kim, CJ Yoo… - … on Computational Science …, 2007 - ieeexplore.ieee.org
In order to detect and locate edge features precisely in real images we have developed an
algorithm by introducing a nonlocal differentiation of intensity profiles called adaptive …
algorithm by introducing a nonlocal differentiation of intensity profiles called adaptive …