Research into Synthesizing Access Control Strategies in Cloud Computing Environment
- 10.2991/emcm-15.2016.66How to use a DOI?
- Cloud computing environment; Access control; Strategy synthesis
The development of computer technologies and the Internet technology has promoted the upgrading of cloud computing, and application mode of information technology also begins to be transferred from the traditional centralized mode to the distributed morphology gradually while people are constantly having higher requirements for information sharing. The effective application of cloud computing can satisfy people’s actual demands in daily work. However, in order to use cloud computing to realize the cross-border collaboration, perfect orientation control strategy should be developed as the guarantee. This paper conducts the research from three aspects: cloud computing, access control and strategies, hoping to promote better development of cloud computing.
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Ping Ni PY - 2016/02 DA - 2016/02 TI - Research into Synthesizing Access Control Strategies in Cloud Computing Environment BT - Proceedings of the International Conference on Electronics, Mechanics, Culture and Medicine PB - Atlantis Press SP - 351 EP - 356 SN - 2352-538X UR - https://doi.org/10.2991/emcm-15.2016.66 DO - 10.2991/emcm-15.2016.66 ID - Ni2016/02 ER -