Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Access control; Cloud computing; Distributed database systems; Open systems; Web services; Authorization systems; Cloud computing securities; Cloud infrastructures; Cooperation agreement; Multi tenancies; Multi-tenancy architectures; Open system architecture; Security risks; Network architecture
Saved in:
Main Authors: | Abd S.K., Salih R.T., Al-Haddad S.A.R., Hashim F., Abdullah A.B.H., Yussof S. |
---|---|
Other Authors: | 56516784600 |
Format: | Conference Paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020) -
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021) -
Secure Access To Authorized Resources Based On Fingerprint Authentication
by: Elmadani, Ahmed Baba
Published: (2003) -
Adaptive multi-tenancy policy for enhancing service level agreement through resource allocation in cloud computing
by: Hussin, Masnida, et al.
Published: (2016) -
A New Router Certification Authority
Protocol For Securing Mobile Internet
Protocol Version 6
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)