{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:35:46Z","timestamp":1742942146825,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319744995"},{"type":"electronic","value":"9783319745008"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74500-8_23","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:20:32Z","timestamp":1521505232000},"page":"255-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Ensuring Security in Cloud Computing Using Access Control: A Survey"],"prefix":"10.1007","author":[{"given":"Fatima","family":"Sifou","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Hammouch","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Kartit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"23_CR1","unstructured":"Prince, J.: Security issues and their solution in cloud computing. Int. J. Comput. Bus. (2012)"},{"issue":"1","key":"23_CR2","first-page":"3643","volume":"3","author":"M Vikas","year":"2014","unstructured":"Vikas, M., Srishti, G., Jyoti, K.: Network security: security in cloud computing. Int. J. Eng. Comput. Sci. 3(1), 3643\u20133651 (2014)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"23_CR3","unstructured":"Cloud computing security considerations, April 2011. Accessed Sept 2012"},{"key":"23_CR4","unstructured":"Ronald, L.K., Russel, D.V.: Cloud Security a Comprehensive Guide to Secure Cloud Computing (2011). \n                    https:\/\/23510310jarinfo.files.wordpress.com"},{"key":"23_CR5","unstructured":"All-of-Government Cloud Computing, Information Security and Privacy Considerations (2014). \n                    https:\/\/www.ict.govt.nz"},{"key":"23_CR6","unstructured":"Youssef, A.E.: Exploring cloud computing services and applications. J. Emerg. Trends Comput. Inf. Sci. 3(6) (2012)"},{"key":"23_CR7","unstructured":"Shyam, N.K., Amit, V.: A survey on secure cloud: security and privacy in cloud computing. Am. J. Syst. Softw. 4(1), 14\u201326 (2016). \n                    https:\/\/doi:10.12691\/ajss-4-1-2"},{"issue":"2","key":"23_CR8","first-page":"136","volume":"1","author":"PP Rabi","year":"2011","unstructured":"Rabi, P.P., Manas, R.P., Suresh, C.S.: Cloud computing: security issues and research challenges. Int. J. Comput. Sci. Inf. Technol. Secur. 1(2), 136\u2013146 (2011)","journal-title":"Int. J. Comput. Sci. Inf. Technol. Secur."},{"key":"23_CR9","unstructured":"Rohit, B., Sugata, S.: Survey on security issues in cloud computing and associated mitigation techniques. DBLP J. (2012)"},{"key":"23_CR10","unstructured":"Bhadauria, R., Chaki, R., Chaki, N., Sanyal, S.: Survey on security issues in cloud computing. ACTA TEHNICA CORVINIENSIS \u2013 Bulletin of Engineering, December 2014"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8, 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Ed-Daibouni, M., Lebbat, A., Tallal, S., Medromi, H.: Toward a new extension of the access control model ABAC for cloud computing. Springer, Singapore (2016)","DOI":"10.1007\/978-981-287-990-5_7"},{"key":"23_CR13","doi-asserted-by":"publisher","unstructured":"Aluva, R.: Enhancing cloud security through access control models: a survey. Int. J. Comput. Appl. (2015). \n                    https:\/\/doi.org\/10.5120\/19677-1400","DOI":"10.5120\/19677-1400"},{"issue":"2","key":"23_CR14","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/jsan3020150","volume":"3","author":"HA Maw","year":"2014","unstructured":"Maw, H.A., Xiao, H., Christianson, B., Malco, J.A.: Survey of access control models in wireless sensor networks. J. Sensor Actuator Netw. 2014 3(2), 150\u2013180 (2014). \n                    https:\/\/doi.org\/10.3390\/j3020150","journal-title":"J. Sensor Actuator Netw. 2014"},{"key":"23_CR15","first-page":"0975","volume":"104","author":"D Bokefode Jayant","year":"2014","unstructured":"Bokefode Jayant, D., Apte Sulabha, S.: Analysis of DAC MAC RBAC access control based models for security. Int. J. Comput. Appl. 104, 0975\u20138887 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Majumder, A., Namasudra, S., Nath, S.: Taxonomy and classification of access control models for cloud environments. Springer, London (2014). \n                    https:\/\/doi.org\/10.1007\/978-1-4471-6452-4_2","DOI":"10.1007\/978-1-4471-6452-4_2"},{"issue":"2","key":"23_CR17","first-page":"34","volume":"4","author":"K Punithasurya","year":"2012","unstructured":"Punithasurya, K., Jeba, P.S.: Analysis of different access control mechanism in cloud. Int. J. Appl. Inf. Syst. (IJAIS) 4(2), 34\u201339 (2012)","journal-title":"Int. J. Appl. Inf. Syst. (IJAIS)"},{"key":"23_CR18","unstructured":"Asim, M., Petkovic, M., Ignatengo, T.: Attribute-based encryption with encryption and decryption outsourcing. In: Australian Information Security Management Conference (2014)"},{"issue":"4","key":"23_CR19","first-page":"231","volume":"15","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environment. Int. J. Netw. Secur. 15(4), 231\u2013240 (2013)","journal-title":"Int. J. Netw. Secur."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Tan, Y.-L., Goi, B.-M., Komiya, R., Tan, S.-Y.: A study of attribute-based encryption for body sensor networks. In: International Conference on Informatics Engineering and Information Science, pp. 238\u2013247, November 2011","DOI":"10.1007\/978-3-642-25327-0_21"}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Smart Cities and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74500-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:58:52Z","timestamp":1558155532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74500-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319744995","9783319745008"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74500-8_23","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"21 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCAMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of the Mediterranean Symposium on Smart City Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tangier","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scams2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.medi-ast.org\/scams17\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}