Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
EACF: extensible access control framework for cloud environments
Date
2017-06-01
Author
Mehak, Faria
Masood, Rahat
Shibli, Muhammad Awais
Elgedway, Islam
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
179
views
0
downloads
Cite This
The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques lack in providing features such as generality, extensibility, and flexibility. Secondly, they are static in nature, such that once the user is authorized, they do not evaluate the access request during and after the resource usage. Every application hosted in the cloud has its own requirement of evaluating access request; some applications require request evaluation before assigning resources, while some require continuous monitoring of resource usage along with a dynamic update of attribute values. To address these diverse requirements, we present an Extensible Access Control Framework (EACF) for cloud-based applications, which provides high-level extensibility by incorporating different access control models about the needs of the Cloud service consumers (organizations). A number of access control models are combined in the EACF, which provides reliable authorization service for managing and controlling access to the software as a service-hosted cloud applications.It also helps cloud consumers to provide authorized access to resources (data), as well as contributes to eliminate the need to write customized security code for individual applications. As a case study, three access control models are incorporated into the framework and tested on SaaS-hosted application DSpace to ascertain that the proposed features are functional and working fine.
Subject Keywords
Electrical and Electronic Engineering
URI
https://hdl.handle.net/11511/67809
Journal
ANNALS OF TELECOMMUNICATIONS
DOI
https://doi.org/10.1007/s12243-016-0548-1
Collections
Engineering, Article
Suggestions
OpenMETU
Core
Fully Integrated Autonomous Interface With Maximum Power Point Tracking for Energy Harvesting TEGs With High Power Capacity
Tabrizi, Hamed Osouli; Jayaweera, Herath M. P. C.; Muhtaroglu, Ali (Institute of Electrical and Electronics Engineers (IEEE), 2020-05-01)
In this article, a novel fully autonomous and integrated power management interface circuit is introduced for energy harvesting using thermoelectric generators (TEGs) to supply power to Internet of Thing nodes. The circuit consists of a self-starting dc & x2013;dc converter based on a dual-phase charge pump with LC-tank oscillator, a digital MPPT unit, and a 1-V LDO regulator. The novel maximum power point tracking (MPPT) algorithm avoids open-circuit state, and accommodates varying input power and ultra-lo...
WAKE-UP RECEIVERS FOR WIRELESS SENSOR NETWORKS: BENEFITS AND CHALLENGES
Demirkol, Ilker; Ersoy, Cem; Onur, Ertan (Institute of Electrical and Electronics Engineers (IEEE), 2009-08-01)
For successful data delivery, the destination nodes should be listening to the medium to receive data when the sender node starts data communication. To achieve this synchronization, there are different rendezvous schemes, among which the most energy-efficient is utilizing wake-up receivers. Current hardware technologies of wake-up receivers enable us to evaluate them as a promising solution for wireless sensor networks. In this article the benefits achieved with wake-up receivers are investigated along wit...
Performance Analysis of Quantized Uplink Massive MIMO-OFDM With Oversampling Under Adjacent Channel Interference
Üçüncü, Ali Bulut; Johansson, Hakan; Yılmaz, Ali Özgür (Institute of Electrical and Electronics Engineers (IEEE), 2020-02-01)
Massive multiple-input multiple-output (MIMO) systems have attracted much attention lately due to the many advantages they provide over single-antenna systems. Owing to the many antennas, low-cost implementation and low power consumption per antenna are desired. To that end, massive MIMO structures with low-resolution analog-to-digital converters (ADC) have been investigated in many studies. However, the effect of a strong interferer in the adjacent band on quantized massive MIMO systems have not been exami...
Circumferential Traveling Wave Slot Array on Cylindrical Substrate Integrated Waveguide (CSIW)
Bayraktar, Omer; Aydın Çivi, Hatice Özlem (Institute of Electrical and Electronics Engineers (IEEE), 2014-07-01)
Traveling wave slot array on cylindrical substrate integrated waveguide (CSIW) is designed, fabricated and measured at K-band. CSIW is formed by wrapping the substrate integrated waveguide (SIW) around the cylinder in the circumferential direction. 16 element longitudinal slot array on the broad wall of single CSIW is designed by the Elliot's design procedure. The spacings between the slot elements are determined to reduce the half power beam width (HPBW) and to obtain good matching at 25 GHz. A 4 x 16 slot...
CBFEM-MPI: A Parallelized Version of Characteristic Basis Finite Element Method for Extraction of 3-D Interconnect Capacitances
Ozgun, Ozlem; Mittra, Raj; Kuzuoğlu, Mustafa (Institute of Electrical and Electronics Engineers (IEEE), 2009-02-01)
In this paper, we present a novel, non-iterative domain decomposition method, which has been parallelized by using the message passing interface (MPI) library, and used to efficiently extract the capacitance matrixes of 3-D interconnect structures, by employing characteristic basis functions (CBFs) in the context of the finite element method (FEM). In this method, which is Failed CBFEM-MPI, the computational domain is partitioned into a number of nonoverlapping subdomains in which the CBFs are constructed b...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
F. Mehak, R. Masood, M. A. Shibli, and I. Elgedway, “EACF: extensible access control framework for cloud environments,”
ANNALS OF TELECOMMUNICATIONS
, pp. 307–323, 2017, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/67809.