Dynamic inter-organizational cooperation setup in Circle-of-Trust environments, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, pp.113-120, 2008. ,
DOI : 10.1109/NOMS.2008.4575124
O2O: Virtual Private Organizations to Manage Security Policy Interoperability, Information Systems Security, pp.101-115, 2006. ,
DOI : 10.1007/11961635_7
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
URL : http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf
Guide to attribute based access control (ABAC) definition and considerations, NIST Special Publication, vol.800, p.162, 2014. ,
DOI : 10.6028/NIST.SP.800-162
Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015. ,
DOI : 10.1109/MC.2015.33
RABAC: Role-Centric Attribute-Based Access Control, Computer Network Security, pp.84-96, 2012. ,
DOI : 10.1007/978-3-642-33704-8_8
Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010. ,
DOI : 10.1109/MC.2010.155
Trust Requirements in Identity Federation Topologies, 2009 International Conference on Advanced Information Networking and Applications, pp.137-145, 2009. ,
DOI : 10.1109/AINA.2009.80
Towards secure dynamic collaborations with group-based RBAC model, Computers & Security, vol.28, issue.5, pp.260-275, 2009. ,
DOI : 10.1016/j.cose.2008.12.004
The NIST definition of cloud computing, 2011. ,
DOI : 10.6028/NIST.SP.800-145
Authorization Federation in IaaS Multi Cloud, Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC '15, pp.63-71, 2015. ,
DOI : 10.1145/775412.775431
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust, Network and System Security, pp.206-220, 2015. ,
DOI : 10.1007/978-3-319-25645-0_14
The authorization leap from rights to attributes, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.69-70, 2012. ,
DOI : 10.1145/2295136.2295150
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
Cross-tenant trust models in cloud computing, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), pp.129-136, 2013. ,
DOI : 10.1109/IRI.2013.6642463
Multi-tenancy authorization models for collaborative cloud services, Proc. of CTS, pp.132-138, 2013. ,
DOI : 10.1002/cpe.3446
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions, Data and Applications Security XIX, pp.252-266, 2005. ,
DOI : 10.1145/605434.605435
Liberty id-ff architecture overview, 2004. ,
ROBAC: Scalable Role and Organization Based Access Control Models, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-9, 2006. ,
DOI : 10.1109/COLCOM.2006.361879