RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      Access control management in cloud environments

      한글로보기

      https://www.riss.kr/link?id=M16025911

      • 저자
      • 발행사항

        Cham, Switzerland : Springer, [2020] ©2020

      • 발행연도

        2020

      • 작성언어

        영어

      • 주제어
      • DDC

        005.8 판사항(23)

      • ISBN

        9783030317287
        3030317285
        9783030317294 (eBook)
        3030317293 (eBook)

      • 자료형태

        일반단행본

      • 발행국(도시)

        스위스

      • 서명/저자사항

        Access control management in cloud environments / Hua Wang, Jinli Cao, Yanchun Zhang

      • 형태사항

        xvii, 300 pages : illustrations ; 25 cm

      • 일반주기명

        Includes bibliographical references and index

      • 소장기관
        • 국립중앙도서관 국립중앙도서관 우편복사 서비스
        • 서강대학교 도서관 소장기관정보 Deep Link
      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      목차 (Table of Contents)

      • CONTENTS
      • Part Ⅰ Description
      • 1 Introduction = 3
      • 1.1 Overview and Motivation = 3
      • 1.1.1 Cloud Computing = 3
      • CONTENTS
      • Part Ⅰ Description
      • 1 Introduction = 3
      • 1.1 Overview and Motivation = 3
      • 1.1.1 Cloud Computing = 3
      • 1.1.2 Internet of Things = 5
      • 1.1.3 Access Control Management = 9
      • 1.2 Objectives of the Book = 16
      • 1.3 Organization of the Book = 17
      • 1.4 Problems and Exercises = 19
      • 1.4.1 Problems = 19
      • 1.4.2 Exercises = 20
      • References = 20
      • 2 Electronic Commerce Items and Related Technology = 25
      • 2.1 Introduction = 25
      • 2.2 Items in Electronic Commerce = 27
      • 2.2.1 Trust and Privacy = 27
      • 2.2.2 Electronic Payment Systems = 28
      • 2.2.3 Mass-Market Adoption = 28
      • 2.2.4 Management and Implementation = 29
      • 2.2.5 Security = 30
      • 2.3 A Framework for Electronic Commerce = 32
      • 2.3.1 Criteria for Choosing a Framework = 33
      • 2.3.2 Framework and Dimensions = 34
      • 2.3.3 Dimension One : Software Technology in E-Commerce = 35
      • 2.3.4 Dimension 2 : Hardware Support in E-Commerce = 35
      • 2.3.5 Dimension 3 : E-Commerce Application = 36
      • 2.4 Conclusions = 37
      • 2.5 Problems and Exercises = 37
      • 2.5.1 Problems = 37
      • 2.5.2 Exercises = 38
      • References = 38
      • 3 Untraceable Electronic Cash System in the Internet of Things = 43
      • 3.1 Introduction = 43
      • 3.1.1 Electronic Cash and Its Properties = 43
      • 3.1.2 Off-line Electronic Cash Overview = 46
      • 3.1.3 Outline of the Chapter = 47
      • 3.2 Some Basic Definitions = 47
      • 3.2.1 Hash Functions and Random Oracle Model = 47
      • 3.2.2 Cut-and-Choose Technique = 48
      • 3.2.3 RSA and DLA = 49
      • 3.2.4 Blind Signature = 50
      • 3.3 Basic Model = 50
      • 3.4 New Off-line Untraceable Electronic Cash Scheme = 51
      • 3.4.1 System Initialization = 52
      • 3.4.2 New Untraceable Electronic Cash Scheme = 52
      • 3.5 Security Analysis = 55
      • 3.6 A Simple Example = 56
      • 3.7 Comparisons = 57
      • 3.8 Conclusion = 58
      • 3.9 Problems and Exercises = 58
      • 3.9.1 Problems = 58
      • 3.9.2 Exercises = 59
      • References = 60
      • Part Ⅱ M-Services and Scalable Payment
      • 4 Achieving Secure and Flexible M-Services Through Tickets = 67
      • 4.1 Introduction = 67
      • 4.2 Security Primitives in the Proposed Architecture = 70
      • 4.2.1 Basic Definitions = 70
      • 4.2.2 Ticket Types = 72
      • 4.3 Single Signature Scheme for Tickets t1 and t2 = 74
      • 4.3.1 System Initialization = 75
      • 4.3.2 The Single Signature Scheme = 76
      • 4.4 Multi-Signature Scheme for Ticket t3 = 77
      • 4.4.1 Scheme Initialization = 78
      • 4.4.2 The Multi-Signature Scheme = 79
      • 4.5 System Security = 81
      • 4.5.1 Threat Analysis = 81
      • 4.5.2 Analysis of Ticket Usage = 82
      • 4.6 Comparisons = 84
      • 4.7 Conclusions = 85
      • 4.8 Problems and Exercises = 85
      • 4.8.1 Problems = 85
      • 4.8.2 Exercises = 86
      • References = 86
      • 5 A Self-Scalable Anonymity Payment Approach in Cloud Environment = 91
      • 5.1 Introduction = 91
      • 5.2 Some Basic Definitions = 94
      • 5.2.1 Hash Functions = 94
      • 5.2.2 DLA and ElGamal Encryption System = 94
      • 5.2.3 Undeniable Signature Scheme and Schnorr Signature Scheme = 95
      • 5.2.4 Role Based Access Control = 96
      • 5.3 Basic Model and New Payment Model = 97
      • 5.3.1 Basic Payment Model = 97
      • 5.3.2 Anonymity Provider Agent = 99
      • 5.3.3 Proof of Ownership of a Coin = 99
      • 5.4 Self-Scalable Anonymity Payment Scheme = 100
      • 5.4.1 System Initialization = 100
      • 5.4.2 New Off-line Payment Scheme = 101
      • 5.4.3 Security Analysis = 103
      • 5.5 User-Role Assignment = 104
      • 5.5.1 Duty Separation Constraints = 104
      • 5.5.2 Grant Model = 106
      • 5.5.3 Revoke Model = 108
      • 5.6 Implementations = 110
      • 5.7 Conclusions = 111
      • 5.8 Problems and Exercises = 112
      • 5.8.1 Problems = 112
      • 5.8.2 Exercises = 112
      • References = 113
      • 6 Using RBAC to Secure Payment Process in Cloud = 117
      • 6.1 Introduction = 117
      • 6.2 Administrative Issues in RBAC = 120
      • 6.2.1 User-Role Assignments = 120
      • 6.2.2 Permission-Role Assignments = 121
      • 6.2.3 Role-Role Assignment = 122
      • 6.2.4 Duty Separation Constraints = 123
      • 6.3 User-Role Assignments for a Flexible Payment Scheme = 124
      • 6.4 Permission-Role Assignments with the Payment Scheme = 130
      • 6.5 Related Work = 132
      • 6.6 Conclusions = 133
      • 6.7 Problems and Exercises = 134
      • 6.7.1 Problems = 134
      • 6.7.2 Exercises = 134
      • References = 134
      • Part Ⅲ RBAC with OCL and Negative Authorization
      • 7 Role-Based Access Control Constraints and Object Constraint Language = 141
      • 7.1 Introduction = 141
      • 7.2 Motivation and Related Technologies = 143
      • 7.2.1 Role-Based Access Control = 144
      • 7.2.2 Unified Modelling Language and Object Constraints Language = 144
      • 7.3 Constraints in RBAC = 146
      • 7.3.1 Separation Constraints = 146
      • 7.3.2 Prerequisite Constraints = 148
      • 7.3.3 Cardinality Constraints = 148
      • 7.3.4 Mobility Constraints = 149
      • 7.4 Constraints Expression with OCL = 149
      • 7.4.1 Separation of Duty Constraints = 149
      • 7.4.2 Mobility Constraints = 151
      • 7.4.3 Prerequisite Constraints = 153
      • 7.4.4 Cardinality Constraints = 153
      • 7.5 Comparisons = 154
      • 7.6 Conclusions = 154
      • 7.7 Problems and Exercises = 155
      • 7.7.1 Problems = 155
      • 7.7.2 Exercises = 155
      • References = 156
      • 8 Role-Based Delegation with Negative Authorization = 159
      • 8.1 Introduction = 159
      • 8.2 Related Work = 161
      • 8.3 Delegation Framework = 162
      • 8.3.1 Basic Elements and Components = 163
      • 8.3.2 Role-Based Delegation = 165
      • 8.4 Delegation Authorization = 167
      • 8.4.1 Authorization Models = 167
      • 8.4.2 An Approach for the Conflicting Problem = 168
      • 8.5 Comparisons = 170
      • 8.6 Conclusions = 170
      • 8.7 Problems and Exercises = 171
      • 8.7.1 Problems = 171
      • 8.7.2 Exercises = 171
      • References = 171
      • Part Ⅳ Ubiquitous Computing and Social Networks
      • 9 Access Control Management for Ubiquitous Computing = 179
      • 9.1 Introduction = 179
      • 9.2 Related Technologies = 182
      • 9.2.1 Usage Control = 182
      • 9.2.2 Ubiquitous Computing Model = 184
      • 9.3 Authorization Models = 185
      • 9.4 Security Architecture = 189
      • 9.4.1 Structure of Reference Monitor = 191
      • 9.4.2 Architectures = 191
      • 9.5 Comparisons = 193
      • 9.6 Conclusions = 195
      • 9.7 Problems and Exercises = 195
      • 9.7.1 Problems = 195
      • 9.7.2 Exercises = 196
      • References = 196
      • 10 Trust-Based Access Control Management in Collaborative Open Social Networks = 203
      • 10.1 Introduction = 203
      • 10.2 Motivations = 206
      • 10.3 A Trust Based Access Framework = 209
      • 10.4 Access Control Policies = 211
      • 10.4.1 Policy Operations = 213
      • 10.4.2 Access Control Architecture = 214
      • 10.5 Access Control Authorizations = 214
      • 10.6 Comparisons = 215
      • 10.7 Conclusions = 217
      • 10.8 Problems and Exercises = 217
      • 10.8.1 Problems = 217
      • 10.8.2 Exercises = 217
      • References = 218
      • Part Ⅴ Access Control Policy and Blockchain Technology
      • 11 Building Access Control Policy Model for Privacy Preserving and Testing Policy Conflicting Problems = 225
      • 11.1 Introduction = 225
      • 11.2 Motivations = 227
      • 11.3 Purpose Involved Access Control Framework = 228
      • 11.4 Access Control Policies = 230
      • 11.4.1 Authorization Models = 231
      • 11.4.2 Policy Operations = 232
      • 11.5 Conflicting Algorithms = 234
      • 11.6 Experimental Results = 237
      • 11.7 Comparisons = 240
      • 11.8 Conclusions = 241
      • 11.9 Problems and Exercises = 242
      • 11.9.1 Problems = 242
      • 11.9.2 Exercises = 242
      • References = 243
      • 12 Effective Collaboration with Information Sharing in Virtual Universities = 249
      • 12.1 Introduction = 249
      • 12.2 Motivations = 252
      • 12.3 The Role-Based Delegation and Revocation Framework = 254
      • 12.3.1 Role-Based Access Control = 254
      • 12.3.2 Role-Based Delegation Model = 255
      • 12.3.3 Role-Based Group Delegation = 259
      • 12.4 Role-Based Delegation Revocations = 260
      • 12.4.1 Revocation Dimensions = 260
      • 12.4.2 Revoking Delegations = 263
      • 12.5 Delegation Authorization = 267
      • 12.5.1 Authorization Models = 267
      • 12.5.2 Authorization Rules = 269
      • 12.6 XML Implementation = 270
      • 12.7 Comparisons = 274
      • 12.8 Conclusions = 275
      • 12.9 Problems and Exercises = 276
      • 12.9.1 Problems = 276
      • 12.9.2 Exercises = 276
      • References = 276
      • 13 Distributed Access Control Through Blockchain Technology = 283
      • 13.1 Introduction = 283
      • 13.2 Access Control Methods and Blockchain Technology = 284
      • 13.2.1 Access Control Methods = 284
      • 13.2.2 Enhancements on Ticket-Based Access Control Scheme for Mobile User = 284
      • 13.2.3 Enhancements on Anonymity Payment Scheme = 285
      • 13.2.4 Enhancements on Formal Authorization Approaches for Role Based Access Control = 285
      • 13.2.5 Blockchain Technology = 286
      • 13.3 Blockchain Based Access Control = 287
      • 13.4 Blockchain-Based Access Control for the Internet of Things = 288
      • 13.5 Future Work = 289
      • 13.5.1 Improvement of the Payment Scheme = 289
      • 13.5.2 Extension of Formal Authorization Approaches for Role Based Access Control = 289
      • 13.5.3 Electronic Commerce with RBAC = 290
      • 13.5.4 Implementation Issues = 290
      • References = 290
      • Index = 299
      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼