{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:53:38Z","timestamp":1725803618895},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662449653"},{"type":"electronic","value":"9783662449660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44966-0_9","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T11:41:36Z","timestamp":1409139696000},"page":"92-100","source":"Crossref","is-referenced-by-count":3,"title":["Research on Access Control Techniques in SaaS of Cloud Computing"],"prefix":"10.1007","author":[{"given":"Shabana","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Gautam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Benantar, M.: Access Control Systems: Security, Identity, Management and Trust Models. Springer US (2009)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Special Publication 800-145 (2011), http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"9_CR3","unstructured":"DORMA: Brivo to Introduce SaaS-Based Access Control Solution at ISC West (2012), http:\/\/www.securitysales.com\/article\/dorma-brivo-to-introduce-saas-based-access-control-solution-at-isc-west"},{"key":"9_CR4","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-19294-4_4","volume-title":"New Frontiers in Information and Software as Services","author":"M.D. Aime","year":"2011","unstructured":"Aime, M.D., Lioy, A., Pomi, P.C., Vallini, M.: Security Plans for SaaS. In: Agrawal, D., Candan, K.S., Li, W.-S. (eds.) Information and Software as Services. LNBIP, vol.\u00a074, pp. 81\u2013111. Springer, Heidelberg (2011)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Chou, Y., Levina, O., Oetting, J.: Enforcing Confidentiality in a SaaS Cloud Environment. In: 19th Telecommunications forum TELFOR, Serbia, Belgrade, November 22-24. IEEE Press (2011)","DOI":"10.1109\/TELFOR.2011.6143500"},{"key":"9_CR6","unstructured":"Risk Taxonomy, Technical Standard (2009), http:\/\/pubs.opengroup.org\/onlinepubs\/9699919899\/toc.pdf"},{"key":"9_CR7","unstructured":"National Vulnerability Database (2014), http:\/\/nvd.nist.gov\/"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Grobauer, B., Walloschek, T., St\u00f6cker, E.: Understanding Cloud Computing Vulnerabilities. Co-published by the IEEE computer and reliability societies (2011)","DOI":"10.1109\/MSP.2010.115"},{"key":"9_CR9","series-title":"AISC","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-642-27948-5_81","volume-title":"Advances in Computer Science and Engineering","author":"H. Wang","year":"2012","unstructured":"Wang, H., Liu, F., Liu, H.: A Method of the Cloud Computing Security Management Risk Assessment. In: Zeng, D. (ed.) Advances in Computer Science and Engineering. AISC, vol.\u00a0141, pp. 609\u2013618. Springer, Heidelberg (2012)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Ganesan, R., Sarkar, S., Tewari, N.: An Independent Verification of Errors and Vulnerabilities in SaaS Cloud. In: 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE Press (2012)","DOI":"10.1109\/DSNW.2012.6264695"},{"issue":"4","key":"9_CR11","first-page":"238","volume":"6","author":"S. Rehman","year":"2012","unstructured":"Rehman, S., Mustafa, K.: Software Design Level Vulnerabilities Classification Model. International Journal of Computer Science and Security\u00a06(4), 238\u2013255 (2012)","journal-title":"International Journal of Computer Science and Security"},{"key":"9_CR12","unstructured":"National Institute of Standard and Technology\/Information Technology Laboratory (NIST\/ITL) Bulletin (December 1995), http:\/\/csrc.nist.gov\/groups\/SNS\/rbac\/documents\/design_implementation\/Intro_role_based_access.htm (retrieved on May 2014)"},{"key":"9_CR13","unstructured":"Demin, F., Xiaoming, W., Zongtao, Z.: An Expanded Role-Based Access Control Model. Computer Engineering and Applications (2003)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Li, D., Liu, C., Liu, B.: H-RBAC: A Hierarchical Access Control Model for SaaS Systems. I. J. Modern Education and Computer Science 5 (2011), http:\/\/www.mecs-press.org\/","DOI":"10.5815\/ijmecs.2011.05.07"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R. Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and System Security (TISSEC)\u00a02, 105\u2013135 (1999)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Li, D., Liu, C., Wei, Q., Liu, Z., Liu, B.: RBAC-based Access Control for SaaS Systems. In: IEEE 2nd International Conference on Information Engineering and Computer Science, ICIECS (2010)","DOI":"10.1109\/ICIECS.2010.5678213"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E.: Privacy-Aware Role-Based Access Control. ACM Transactions on Information and System Security\u00a013(3), Article 24 (2010)","DOI":"10.1145\/1805974.1805980"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Chilro, D., Antunes, L.: How to Securely Break into RBAC: The BTG-RBAC Model. In: Proceedings of 25th Annual Computer Security Applications Conference, Honolulu, Hawaii (2009)","DOI":"10.1109\/ACSAC.2009.12"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Rajesh, K., Nayak, A.: Modified BTG-RBAC Modelf or SaaS. In: Proceedings of International Conference on Cloud Computing, Technologies, Applications & Management (2012)","DOI":"10.1109\/ICCCTAM.2012.6488076"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Sirisha, A., Kumari, G.: API Access Control in Cloud Using the Role Based Access Control Model. In: Trendz in Information Sciences & Computing, TISC (2010)","DOI":"10.1109\/TISC.2010.5714624"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Chung, H., Chen, J., Violetta, M.A., Yang, C.Y.: Contract RBAC in cloud computing. Springer Science Business Media, New York (2013)","DOI":"10.1007\/s11227-013-1017-5"},{"key":"9_CR22","unstructured":"Cao, J., Li, P., Zhu, Q., Qian, P.: A Tenant-Based Access Control Model T-Arbac. Computer Science and Application (2013), http:\/\/www.hanspub.org\/journal\/csa.html"},{"key":"9_CR23","volume-title":"Verifiable computation with access control in cloud Computing","author":"L. Xu","year":"2013","unstructured":"Xu, L., Tang, S.: Verifiable computation with access control in cloud Computing. Springer Science+Business Media, New York (2013)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute based encryption. In: Proc. IEEE Symp. Security and Privacy, Oakland, CA (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL (2010)","DOI":"10.1145\/1866307.1866414"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: IEEE INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Wan, Z., Liu, J., Deng, R.H.: HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. IEEE Transactions on Information Forensics and Security\u00a07(2) (2012)","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"9_CR28","volume-title":"Ontology-based access control model for security policy reasoning in cloud computing","author":"C. Choi","year":"2013","unstructured":"Choi, C., Choi, J., Kim, P.: Ontology-based access control model for security policy reasoning in cloud computing. Springer Science+Business Media, New York (2013)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Pervez, Z., Khattak, A.M., Lee, S., Lee, Y., Huh, E.: Oblivious access control policies for cloud based data sharing systems. Springer (2012)","DOI":"10.1007\/s00607-012-0206-z"},{"key":"9_CR30","volume-title":"Slight Homomorphic Signature for Access Controlling in Cloud Computing","author":"Z. Wang","year":"2013","unstructured":"Wang, Z., Sha, K., Lv, W.: Slight Homomorphic Signature for Access Controlling in Cloud Computing. Springer Science+Business Media, New York (2013)"},{"key":"9_CR31","volume-title":"Software Service Signature (S3) for authentication in cloud Computing","author":"L. Xu","year":"2013","unstructured":"Xu, L., Cao, X., Zhang, Y., Wu, W.: Software Service Signature (S3) for authentication in cloud Computing. Springer Science+Business Media, New York (2013)"},{"key":"9_CR32","unstructured":"L&T Infotech: Selected to drive Cloud access security software to market. Express Computers (May 15, 2011), http:\/\/go.galegroup.com\/ps\/i.do?id=GALE%7CA257405511&v=2.1&u=sdl&it=r&p=CDB&sw=w&asid=b7f8961ca216c997f7384bc9c9c8c5f5"},{"key":"9_CR33","unstructured":"Visual-Gurad (2014), http:\/\/www.visual-guard.com\/EN\/net-powerbuilder-application-security-authentication-permission-access-control-rbac-articles"},{"key":"9_CR34","unstructured":"Double Vision (2014), http:\/\/www.doublevision.ca\/access-control-systems.html"},{"key":"9_CR35","unstructured":"Dorma (2012), http:\/\/www.prweb.com\/releases\/2012\/2\/prweb9225731.htm"},{"key":"9_CR36","unstructured":"Safenet (2014), http:\/\/www.safenet-inc.com\/data-protection\/virtualization-cloud-security\/saas-security-cloud-access-control\/"},{"key":"9_CR37","unstructured":"Cisco (2014), http:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/anyconnect-secure-mobility-client\/white_paper_c11-596141.html"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44966-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T17:54:53Z","timestamp":1650045293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44966-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449653","9783662449660"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44966-0_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}