{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:43:59Z","timestamp":1729662239141,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/snpd.2016.7515896","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T20:38:58Z","timestamp":1469565538000},"page":"169-176","source":"Crossref","is-referenced-by-count":1,"title":["Self-adaptive access control &amp; delegation in cloud computing"],"prefix":"10.1109","author":[{"given":"Ali Ahmad","family":"Malik","sequence":"first","affiliation":[]},{"given":"Hirra","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Muhammad Awais","family":"Shibli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s12394-009-0031-5","article-title":"Delegation of access rights in multi-domain service compositions","volume":"2","author":"laurent","year":"2009","journal-title":"Identity in the Information Society"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10619-012-7120-4","article-title":"Dynamic delegation framework for role based access control in distributed data management systems","volume":"32","author":"chun","year":"2014","journal-title":"Distributed and Parallel Databases"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/TSMCA.2010.2045118","article-title":"Independently verifiable decentralized role-based delegation","volume":"40","author":"roberto","year":"2010","journal-title":"Systems Man and Cybernetics Part A Systems and Humans IEEE Transactions on"},{"key":"ref13","article-title":"Object Isolation for Cloud with DOMAIN RBAC","author":"vidya","year":"2012","journal-title":"Cloud Computing in Emerging Markets (CCEM) 2012 IEEE International Conference on"},{"key":"ref14","article-title":"Evaluation and establishment of trust in cloud federation","author":"ayesha","year":"2014","journal-title":"Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication ACM"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ijar.2004.03.003","article-title":"Multiplication and comultiplication of beliefs","volume":"38","author":"audun","year":"2005","journal-title":"International Journal of Approximate Reasoning"},{"article-title":"Assessment of Access Control Systems","year":"2007","author":"david","key":"ref16"},{"year":"2016","key":"ref17","article-title":"WS02 Identity Server"},{"year":"2016","key":"ref18","article-title":"JUnit"},{"year":"2016","key":"ref19","article-title":"NetLogo"},{"article-title":"The NIST definition of cloud computing","year":"2011","author":"peter","key":"ref4"},{"key":"ref3","first-page":"24","article-title":"Security and privacy challenges in cloud computing environments","volume":"6","author":"hassan","year":"2010","journal-title":"IEEE Security & Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28714-5_24"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.cose.2009.12.009","article-title":"On a taxonomy of delegation","volume":"29","author":"quan","year":"2010","journal-title":"Computers & Security"},{"key":"ref8","first-page":"48","article-title":"Engineering self-adaptive systems through feedback loops.","author":"yuriy","year":"2009","journal-title":"Software Engineering for Self-Adaptive Systems"},{"key":"ref7","article-title":"Requirements engineering for self-adaptive systems: Core ontology and problem statement.","author":"naumana","year":"2011","journal-title":"Advanced Information Systems Engineering"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","article-title":"Cloud computing: state-of-the-art and research challenges","volume":"1","author":"qi","year":"2010","journal-title":"Journal of Internet Services and Applications"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.procs.2014.08.053","article-title":"State-of-the-art survey on cloud computing security Challenges, approaches and solutions","volume":"37","author":"farrukh","year":"2014","journal-title":"Procedia Computer Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.04.003"},{"key":"ref20","first-page":"135","article-title":"Performance and security tradeoff","author":"katinka","year":"2010","journal-title":"Formal Methods for Quantitative Aspects of Programming Languages"}],"event":{"name":"2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2016,5,30]]},"location":"Shanghai, China","end":{"date-parts":[[2016,6,1]]}},"container-title":["2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7510515\/7515861\/07515896.pdf?arnumber=7515896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:15:14Z","timestamp":1498331714000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7515896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/snpd.2016.7515896","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}