{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:11:29Z","timestamp":1729642289724,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637425","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:21:09Z","timestamp":1383088869000},"page":"1628-1633","source":"Crossref","is-referenced-by-count":6,"title":["Agent-based approach for distributed access control in cloud environments"],"prefix":"10.1109","author":[{"given":"Manoj V.","family":"Thomas","sequence":"first","affiliation":[]},{"given":"K.","family":"Chandra Sekaran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"548","article-title":"A dynamic access control model based on trust","author":"zhao","year":"2010","journal-title":"Proc 2nd Conference on Environmental Science and Information Application Technology"},{"key":"17","first-page":"312","article-title":"Analysis and design of an access control model based on credibility","author":"chaowen","year":"2009","journal-title":"Proc International Conference on Computer Engineering and Technology"},{"key":"18","first-page":"121","article-title":"Generalised access control in hierarchical computer network","author":"krawczyk","year":"2010","journal-title":"Proc 2nd International Conference on Information Technology"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/CRISIS.2008.4757458"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/HPCC.2008.37"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/ICPCA.2007.4365483"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/NPC.2007.106"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ISCC.2005.10"},{"key":"12","article-title":"Domain based access control model for distributed collaborative applications","author":"demchenko","year":"2006","journal-title":"Proc Second IEEE International Conference on e-Science and Grid Computing"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/IPDPS.2011.237"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/POLICY.2011.49"},{"key":"22","article-title":"Identity management in cloud computing-A review","volume":"1","author":"gunjan","year":"2012","journal-title":"International Journal of Engineering Research and Technology (IJERT) ISSN 2278-0181"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/2.970591"},{"key":"24","first-page":"315","article-title":"Security agent based distributed authorization: An approach","author":"varadharajan","year":"1998","journal-title":"Proc the 21st National Information Systems Security Conference (NISSC) USA"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1108\/10662240110365724"},{"key":"3","first-page":"464","article-title":"Intelligent agents: An emerging technology for next generation telecommunications","author":"magedanz","year":"1996","journal-title":"Proc IEEE Globecom"},{"key":"2","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1016\/j.comcom.2004.05.011","article-title":"Applications of agent technology in communications: A review","volume":"27","author":"manvi","year":"2004","journal-title":"Computer Communications"},{"key":"10","article-title":"Designing secure e-commerce with role-based access control","author":"yang","year":"2003","journal-title":"Proc IEEE International Conference on E-Commerce (CEC'03) 0-7695-1969-5\/03"},{"key":"1","first-page":"4451","article-title":"An attribute and role based access control model for service-oriented environment","author":"wei","year":"2010","journal-title":"Proc Chinese Control and Decision Conference"},{"key":"7","volume":"42","author":"lange","year":"1999","journal-title":"Dispatch Your Agents Shut Offyour Machine"},{"year":"2001","author":"weiss","journal-title":"Multiagent Systems A Modern Approach to Distributed Artificial Intelligence","key":"6"},{"year":"1999","author":"weiss","journal-title":"Multi-Agent Systems","key":"5"},{"year":"2002","author":"wooldridge","journal-title":"An Introduction to Multiagent Systems","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICC.2001.936308"},{"key":"8","first-page":"24","article-title":"An object-oriented rbac model for distributed system","author":"zang","year":"2001","journal-title":"Proc Working IEEE\/IFIP Conf Software Architecture"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2013,8,22]]},"location":"Mysore","end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637425.pdf?arnumber=6637425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:01:55Z","timestamp":1498093315000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637425","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}