@incollection{, 4016C174BA972C16520C60D25FA21B5C , author={{LevinaT} and {Dr. S CLingareddy} and {Alpha College of Engg}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1316519 } @book{b0, , title={{}} , author={{ ZhuTianyi }} } @incollection{b1, , title={{An efficient Role Based Access Control System for Cloud Computing}} , author={{ LiuWeidong } and { ;Song Jiaxing }} , booktitle={{11th IEEE International Conference on Computer and Information Technology}} , year={2011} } @incollection{b2, , author={{ WeiLi; Haishan Wan; Xunyiren } and { ; ShengLi }} , booktitle={{IEEE/ACIS 11th International Conference on Computer and Information Science}} , year={2012. 2012} } @book{b3, , title={{}} , author={{ CanhNgo }} } @book{b4, , title={{Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures}} , author={{ PeterMembrey } and { ; YuriDemchenk }} , note={Cees de Laat} } @book{b5, , title={{Seventh International Conference on Availability, Reliability and Security}} , year={2012} } @book{b6, , title={{A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi}} , author={{ Jiehuang;Mohamedsharaf;Chin-TserHuang }} } @book{b7, , title={{41st International Conference on Parallel Processing Workshops}} , year={2012} } @book{b8, , title={{}} , author={{ LAnil } and { Pereira } and { Vineelamuppavarapu }} } @incollection{b9, , title={{Role-Based Access Control for Grid Database Services Using the Community Authorization Service}} , author={{ SoonMChung }} , journal={{IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING}} 3 2 , year={APRIL-JUNE 2006} } @incollection{b10, , title={{}} , journal={{Ammar Masood}} , publisher={ArifGhafoor} } @book{b11, , author={{ AdityaMathur }} , title={{Conformance Testing of Temporal Role-Based Access Control Systems"; IEEE TRANSACTIONS}} } @book{b12, , title={{Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds}} , author={{ MilosSushmitaruj } and { Stojmenovic }} 10.1109/TPDS.2013.38 , year={2013} , note={Digital Object Indentifier} , note={Amiya Nayak} } @incollection{b13, , title={{A Flexible Payment Scheme and Its Role-Based Access Control}} , author={{ HuaWang } and { ; Jinli Cao; YanchunZhang }} , journal={{IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING}} 17 3 , year={MARCH 2005} } @book{b14, , title={{}} , author={{ Karstensohr }} } @book{b15, , title={{}} , author={{ MichaelDrouineaud }} } @book{b16, , title={{}} , author={{ Gail-Joonahn }} } @book{b17, , title={{Analyzing and Managing Role-Based Access Control Policies}} , author={{ MartinGogolla }} } @incollection{b18, , title={{}} , journal={{IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING}} 20 7 , year={JULY 2008} } @book{b19, , title={{}} , author={{ ; Ninghui Li; QihuaSomeshjha } and { Wang }} } @incollection{b20, , title={{Toward Formal Verification of Role-Based Access Control Policies}} , author={{ HWilliam } and { Winsborough; Mahesh Tripunitara }} , journal={{IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING}} 5 4 , year={OCTOBER-DECEMBER 2008} } @book{b21, , title={{}} , author={{ AmmarMasood } and { ; RafaeBhatti }} } @book{b22, , title={{}} , author={{ AdityaMathur }} } @incollection{b23, , title={{Scalable and Effective Test Generation for Role-Based Access Control Systems}} , journal={{IEEE TRANSACTIONS ON SOFTWARE ENGINEERING}} 35 5 , year={SEPTEMBER/OCTOBER 2009} } @book{b24, , title={{}} , author={{ YingyingYu }} } @incollection{b25, , title={{Task-role based access control model in logistics management system}} , author={{ YanChen } and { ; YuqinWen }} , booktitle={{Service Operations and Logistics, and Informatics (SOLI), 2013 IEEE International Conference on}} , year={28-30 July 2013} } @incollection{b26, , title={{Achieving Secure Role-based Access Control on Encrypted Data in Cloud Storage}} , author={{ LZhou } and { VVaradharajan } and { MHitchens }} , journal={{Information Forensics and Security}} 99 , note={IEEE Transactions on} } @incollection{b27, , title={{Role-Based Access Control Model Supporting Regional Division in Smart Grid System}} , author={{ DRosic } and { UNovak } and { SVukmirovic }} , booktitle={{Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on}} , year={June 2013} 201 } @incollection{b28, , title={{Cryptographically Enforced RBAC}} , author={{ ALFerrara } and { GFuchsbauer } and { BWarinschi }} , booktitle={{Computer Security Foundations Symposium (CSF), 2013 IEEE 26th}} , year={June 2013} 129 } @incollection{b29, , title={{An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning}} , author={{ EBertino } and { CBettini } and { EFerrari } and { PSamarati }} , journal={{ACM Trans. Database Systems}} 23 , year={Sept. 1998} } @incollection{b30, , title={{An Authorization Model for Temporal and Derived Data: Securing Information Portals}} , author={{ VAtluri } and { AGal }} , journal={{ACM Trans. Information and System Security}} 5 1 , year={Feb. 2002} } @incollection{b31, , title={{Role-Based Authorization Constraints Specification}} , author={{ GAhn } and { RSandhu }} , journal={{ACM Trans. Information and System Security}} 3 4 , year={Nov. 2000} } @incollection{b32, , title={{Proposed NIST Standard for Role-Based Access Control}} , author={{ DFFerraiolo } and { RSandhu } and { SGavrila } and { DRKuhn } and { RChandramouli }} , journal={{ACM Trans. Information and System Security}} 4 3 , year={Aug. 2001} }