{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T19:08:52Z","timestamp":1649185732261},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T00:00:00Z","timestamp":1479686400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s12243-016-0548-1","type":"journal-article","created":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T06:12:53Z","timestamp":1479708773000},"page":"307-323","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["EACF: extensible access control framework for cloud environments"],"prefix":"10.1007","volume":"72","author":[{"given":"Faria","family":"Mehak","sequence":"first","affiliation":[]},{"given":"Rahat","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Muhammad Awais","family":"Shibli","sequence":"additional","affiliation":[]},{"given":"Islam","family":"Elgedway","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,21]]},"reference":[{"key":"548_CR1","unstructured":"Gouglidis A (2011) Towards new access control models for cloud computing systems. Kaspersky"},{"key":"548_CR2","doi-asserted-by":"crossref","unstructured":"Tang Z, Wei J, Sallam A, Li K, Li R (2012) A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing. Springer, pp 279\u2013288","DOI":"10.1007\/978-3-642-30767-6_24"},{"key":"548_CR3","unstructured":"Ghazia U, Masood R, Awais Shibli M (2012) Comparative analysis of access control systems on the cloud. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD). IEEE, pp 41\u201346"},{"key":"548_CR4","doi-asserted-by":"crossref","unstructured":"Majumder A, Namasudra S, Nath S (2014) Taxonomy and classification of access control models for cloud environments. In: Continued Rise of the Cloud. Springer, pp 23\u201353","DOI":"10.1007\/978-1-4471-6452-4_2"},{"key":"548_CR5","unstructured":"Ferraiolo D, Cugini J, Kuhn DR (1995) Role-based access control (RBAC): Features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp 241\u201348"},{"key":"548_CR6","doi-asserted-by":"crossref","unstructured":"Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. ACM, pp 57\u201364","DOI":"10.1145\/507711.507722"},{"key":"548_CR7","doi-asserted-by":"crossref","unstructured":"Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control, ACM","DOI":"10.1145\/507721.507722"},{"key":"548_CR8","doi-asserted-by":"crossref","unstructured":"Yuan E, Jin T (2005) Attributed based access control (abac) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS). IEEE","DOI":"10.1109\/ICWS.2005.25"},{"key":"548_CR9","doi-asserted-by":"crossref","unstructured":"Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 89\u201396","DOI":"10.1109\/CloudCom.2010.44"},{"issue":"8","key":"548_CR10","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1631\/jzus.C0910466","volume":"11","author":"J Shi","year":"2010","unstructured":"Shi J, Zhu H (2010) A fine-grained access control model for relational databases. J Zhejiang Univ Sci C 11 (8):575\u2013586","journal-title":"J Zhejiang Univ Sci C"},{"key":"548_CR11","unstructured":"Godik Simon, Anderson Anne, Parducci B, et al. (2002) Oasis extensible access control markup language (XACML) 3. Technical report, Technical Representative. OASIS"},{"key":"548_CR12","unstructured":"GitHub wso2 (2016) WSO2 Balana Implementation"},{"issue":"2","key":"548_CR13","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11704-014-3160-4","volume":"9","author":"R Masood","year":"2015","unstructured":"Masood R, Shibli MA, et al. (2015) Cloud authorization: exploring techniques and approach towards effective access control framework. Frontiers of Computer Science 9(2):297\u2013321","journal-title":"Frontiers of Computer Science"},{"issue":"1","key":"548_CR14","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jisa.2014.04.003","volume":"19","author":"YA Younis","year":"2014","unstructured":"Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. Journal of Information Security and Applications 19(1):45\u201360","journal-title":"Journal of Information Security and Applications"},{"key":"548_CR15","doi-asserted-by":"crossref","unstructured":"Lang U (2010) Openpmf scaas: Authorization as a service for cloud & soa applications. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 634\u2013643","DOI":"10.1109\/CloudCom.2010.13"},{"key":"548_CR16","doi-asserted-by":"crossref","unstructured":"Almutairi A, Sarfraz M, Basalamah S, Aref W, Ghafoor A (2011) A distributed access control architecture for cloud computing. IEEE","DOI":"10.1109\/MS.2011.153"},{"key":"548_CR17","doi-asserted-by":"crossref","unstructured":"Sirisha A, Kumari GG (2010) API access control in cloud using the role based access control model. In: Trendz in Information Sciences & Computing (TISC), 2010. IEEE, pp 135\u2013137","DOI":"10.1109\/TISC.2010.5714624"},{"key":"548_CR18","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen JL (2012) Access control as a service for public cloud storage. In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, pp 526\u2013 536","DOI":"10.1109\/ICDCSW.2012.65"},{"key":"548_CR19","doi-asserted-by":"crossref","unstructured":"Mon EE, Naing TT (2011) The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 4th International Conference on Broadband Network and Multimedia Technology (IC-BNMT). IEEE, pp 447\u2013 451","DOI":"10.1109\/ICBNMT.2011.6155974"},{"key":"548_CR20","doi-asserted-by":"crossref","unstructured":"Bates A, Mood B, Valafar M, Butler K (2013) Towards secure provenance-based access control in cloud environments. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. ACM, pp 277\u2013284","DOI":"10.1145\/2435349.2435389"},{"key":"548_CR21","unstructured":"Lazouski A, Mancini G, Martinelli F, Mori P (2012) Usage control in cloud systems. In: 2012 International Conference for Internet Technology And Secured Transactions. IEEE, pp 202\u2013207"},{"key":"548_CR22","unstructured":"Masood R, Awais Shibli M, Bilal M, et al. (2012) Usage control model specification in XACML policy language. In: Computer Information Systems and Industrial Management. Springer, pp 68\u201379"},{"key":"548_CR23","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM. IEEE, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"548_CR24","doi-asserted-by":"crossref","unstructured":"Li XY, Shi Y, Guo Y, Ma W (2010) Multi-tenancy based access control in cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE , pp 1\u20134","DOI":"10.1109\/CISE.2010.5677061"},{"key":"548_CR25","doi-asserted-by":"crossref","unstructured":"Popa L, Minlan Y, Ko SY, Ratnasamy S, Stoica I (2010) Cloudpolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, p 7","DOI":"10.1145\/1868447.1868454"},{"key":"548_CR26","doi-asserted-by":"crossref","unstructured":"Zhu J, Wen Q (2012) Saas access control research based on ucon. In: 2012 Fourth International Conference on Digital Home (ICDH). IEEE, pp 331\u2013334","DOI":"10.1109\/ICDH.2012.50"},{"key":"548_CR27","doi-asserted-by":"crossref","unstructured":"Huang J, Nicol D, Bobba R, Huh JH (2012) A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, pp 187\u2013196","DOI":"10.1145\/2295136.2295170"},{"key":"548_CR28","doi-asserted-by":"crossref","unstructured":"Khamadja S, Adi K, Logrippo L (2013) An access control framework for hybrid policies. In: Proceedings of the 6th International Conference on Security of Information and Networks. ACM, pp 282\u2013286","DOI":"10.1145\/2523514.2523549"},{"key":"548_CR29","doi-asserted-by":"crossref","unstructured":"Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of Cryptography and Security. Springer, pp 756\u2013758","DOI":"10.1007\/978-1-4419-5906-5_784"},{"key":"548_CR30","doi-asserted-by":"crossref","unstructured":"Khamadja S, Adi K, Logrippo L (2013) Designing flexible access control models for the cloud. In: Proceedings of the 6th International Conference on Security of Information and Networks, pages 225\u2013232 ACM","DOI":"10.1145\/2523514.2527005"},{"key":"548_CR31","doi-asserted-by":"crossref","unstructured":"Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, pp 523\u2013 528","DOI":"10.1145\/2484313.2484383"},{"key":"548_CR32","doi-asserted-by":"crossref","unstructured":"Rashwand S, Mi\u0161i\u0107 J (2010) A novel access control framework for secure pervasive computing. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. ACM, pp 829\u2013833","DOI":"10.1145\/1815396.1815587"},{"key":"548_CR33","unstructured":"Hansmann U (2003) Pervasive computing: The mobile world. Springer"},{"issue":"2","key":"548_CR34","first-page":"01","volume":"62","author":"S Ullah","year":"2013","unstructured":"Ullah S, Xuefeng Z, Feng Z (2013) Tcloud: A dynamic framework and policies for access control across multiple domains in cloud computing. Int J Comput Appl 62(2):01\u201307","journal-title":"Int J Comput Appl"},{"key":"548_CR35","doi-asserted-by":"crossref","unstructured":"Mchumo S, Chi H (2010) A framework for access control model in enterprise healthcare via saml. In: Proceedings of the 48th Annual Southeast Regional Conference. ACM, p 113","DOI":"10.1145\/1900008.1900154"},{"key":"548_CR36","doi-asserted-by":"crossref","unstructured":"Costabello L, Villata S, Delaforge N, Gandon F (2012) Shi3ld: an access control framework for the mobile web of data. In: Proceedings of the 23rd ACM Conference on Hypertext and Social Media. ACM, pp 311\u2013312","DOI":"10.1145\/2309996.2310049"},{"issue":"4","key":"548_CR37","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.sysarc.2010.04.005","volume":"57","author":"D Ferraiolo","year":"2011","unstructured":"Ferraiolo D, Atluri V, Gavrila S (2011) The policy machine: a novel architecture and framework for access control policy specification and enforcement. J Syst Archit 57(4):412\u2013424","journal-title":"J Syst Archit"},{"key":"548_CR38","first-page":"1","volume":"14","author":"PH Baker","year":"2001","unstructured":"Baker PH (2001) Security Assertions Markup Language. May 14:1\u201324","journal-title":"May"},{"key":"548_CR39","unstructured":"Rissanen E eXtensible Access Control Markup Language (XACML) version 3.0 (committe specification 01). In Technical report, OASIS, http:\/\/docs.oasisopen.org\/xacml\/3.0\/xacml-3.0-core-spec-cd-03-en.pdf"},{"key":"548_CR40","unstructured":"Gamma E, Beck K (2006) Junit"},{"key":"548_CR41","doi-asserted-by":"crossref","unstructured":"Smith M, Barton M, Bass M, Branschofsky M, McClellan G, Stuve D, Tansley R, Walker JH (2003) Dspace: An open source dynamic digital repository. Corporation for National Research Initiatives","DOI":"10.1045\/january2003-smith"},{"key":"548_CR42","unstructured":"Mao Y, Junqueira FP, Marzullo K (2008) Mencius: Building efficient replicated state machines for wans. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation OSDI\u201908,. USENIX Association, Berkeley, CA, pp 369\u2013384"},{"key":"548_CR43","doi-asserted-by":"crossref","unstructured":"Amir Y, Coan B, Kirsch J, Lane J (2007) Customizable fault tolerance forwide-area replication. In: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, SRDS \u201907. IEEE Computer Society, Washington, DC, pp 65\u201382","DOI":"10.1109\/SRDS.2007.40"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-016-0548-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-016-0548-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-016-0548-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T11:51:34Z","timestamp":1601207494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-016-0548-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,21]]},"references-count":43,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["548"],"URL":"https:\/\/doi.org\/10.1007\/s12243-016-0548-1","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,21]]}}}