[HTML][HTML] A delegation model for SDN-driven federated cloud

A Ahmad, AS Alzahrani, N Ahmed, T Ahsan - Alexandria Engineering …, 2020 - Elsevier
The federated cloud paradigm is getting popular for its dynamic allocation of resources,
processing power, improved performance, and scalability. A federated cloud lets multiple …

Taxonomy of delegation model

A Ali, U Habiba, MA Shibli - 2015 12th international conference …, 2015 - ieeexplore.ieee.org
Protection of shared data from unauthorized users is the most challenging problem of cyber
security for which different access control models have been introduced. However, to …

Definition of an advanced identity management infrastructure

G Dólera Tormo, G López Millán… - International Journal of …, 2013 - Springer
In recent years, organizations are starting to demand a finer user access control in order to
offer added-value services, while end users desire more control over their private …

Fine‐grained filtering to provide access control for data providing services within collaborative environments

K Brown, M Hayes, D Allison… - Concurrency and …, 2015 - Wiley Online Library
A data providing service (DPS) in service‐oriented architecture is tasked only with the
retrieval of data that are annotated over a domain ontology. One particular motivating …

A capability-based access control framework with delegation support

H Shen - … , Networking and Applications: Proceedings of WCNA …, 2016 - Springer
This paper presents a capability-and policy-based access control framework with delegation
support (CPBAC) for distributed system that provides two types of delegation: administrative …

Trust and compliance management models in emerging outsourcing environments

A Pasic, J Bareño, B Gallego-Nicasio, R Torres… - Software Services for e …, 2010 - Springer
Businesses today have more than ever a sharp focus on reducing capital and operational
expenses. Business Process Outsourcing (BPO), Knowledge Process Outsourcing (KPO) …

[PDF][PDF] RPPM: a relationship-based access control model utilising Relationships, Paths and Principal Matching.

J Sellwood - 2017 - pure.royalholloway.ac.uk
Since their introduction, the use (and abuse) of computer systems has grown astronomically,
and consequently so has the need to manage the sharing of data between users, processes …

GARD: Generic access rights delegation framework for collaborative environment

A Ali, A Kanwal, MA Shibli - 2015 Conference on Information …, 2015 - ieeexplore.ieee.org
Delegation of access rights is becoming a common requirement of cloud based
organizations. In this regard, various delegation models have been proposed. These models …

Mobile device display of federated wireless access point networks for 5G or other next generation network

N Schenck, S Meredith, W Cottrill - US Patent 10,880,804, 2020 - Google Patents
(57) ABSTRACT Wireless fidelity (Wi-Fi) devices that are not associated with a specific
wireless carrier can be contractually operated as an extension of the specific Wi-Fi carrier. In …

Application and evaluation of edge detection system employing the ADD

JG Lee, EM Kim, CJ Yoo… - … on Computational Science …, 2007 - ieeexplore.ieee.org
In order to detect and locate edge features precisely in real images we have developed an
algorithm by introducing a nonlocal differentiation of intensity profiles called adaptive …