@incollection{, 9965187769B83026BCAFFE1279C05690 , author={{B. SrinivasaRao} and {G. AppaRao} and {GITAM University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}161111 } @incollection{b0, , title={{Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth}} , author={{ APMarcos } and { Leandro } and { JTiago } and { DanielRNascimento } and { CarlaMSantos } and { CarlosBWestphall } and { Westphall }} , booktitle={{The Eleventh International Conference on Networks}} , year={2012} } @book{b1, , title={{Semantic-aware multitenancy authorization system for cloud architectures}} , author={{ JorgeBernal Bernabe A } and { JuanMMarin Perez B } and { JoseMAlcaraz Calero B } and { FelixJGarcia Clementec } and { GregorioMartinez Perez A } and { AntonioFGomez Skarmetaa }} , year={2012} , publisher={ELsevier} } @incollection{b2, , title={{Role Based Access Control Mechanism In Cloud Computing Using Co -Operative Secondary Authorization Recycling Method}} , author={{ SLReeja }} , journal={{International Journal of Emerging Technology and Advanced Engineering}} 2 10 , year={2012} } @incollection{b3, , title={{Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol}} , author={{ UmerKhalida } and { AbdulGhafoor } and { MisbahIrum }} , booktitle={{Muhammad Awais Shibli.}} 22 , year={2013} , publisher={ELsevier} } @book{b4, , title={{Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud}} , author={{ ArnarBirgisson } and { JoeGibbs Politz } and { AnkurLfar Erlingsson } and { Taly }} , year={2014} , publisher={ACM} } @incollection{b5, , title={{A framework for authentication and authorization credentials in cloud computing}} , author={{ *Nelson Mimura Gonzalez } and { Marco Antônio TorrezRojas } and { MarcosViníciusMaciel Da Silva } and { FernandoRedígolo } and { TerezaCristina Melo De Brito Carvalho } and { * } and { CharlesChristianMiers } and { ? } and { MatsNäslund } and { ? } and { AbuSho }} , journal={{IEEE}} , year={2013} } @incollection{b6, , title={{A UCONABC Resilient Authorization Evaluation for Cloud Computing}} , author={{ AltairArlindo Luis MarconJr } and { MaiconOlivo Santin } and { JulianaStihler } and { BachtoldJr }} , journal={{IEEE}} 25 2 , year={2014} } @book{b7, , title={{OpenPMF SCaaS: Authorization as a Service for Cloud & SOA Applications}} , author={{ UlrichLang }} , year={2010} , publisher={IEEE} } @book{b8, , title={{IMS Cloud Computing Architecture for High-Quality Multimedia Applications}} , author={{ Jiann-LiangChenz } and { Szu-LinWuy } and { YanuariusTeofilus Larosa } and { Pei-JiaYang } and { Yang-FangLi }} , year={2011} , publisher={IEEE} } @book{b9, , title={{}} , author={{ MasoumehZareapoor } and { PouryaShamsolmoali } and { MAfshar Alam }} , year={2014} , address={Safe Cloud} } @incollection{b10, , title={{}} , journal={{Evaluation. International Journal of Electronics and Information Engineering}} 1 2 } @incollection{b11, , title={{Study of Intrusion Detection System for DDoS Attacks in Cloud Computing}} , author={{ NareshKumar } and { ShaliniSharma }} , journal={{IEEE}} , year={2013} } @incollection{b12, , title={{Cloud Security Auditing: Challenges and Emerging Approaches}} , author={{ JungwooRyoo } and { SyedRizvi } and { WilliamAiken } and { JohnKissell }} , journal={{IEEE}} , year={2013} } @book{b13, , title={{Cloud authorization: exploring techniques and approach towards effective access control framewo rk}} , author={{ MasoodRahat } and { MuhammadAwais } and { ShibliYumna } and { Ghazi } and { AyeshaKanwal } and { AliArshad }} , year={2014} , publisher={Springer-Verlag} , address={Berlin Heidelberg} } @book{b14, , title={{AN AUTHORIZATION MODEL FOR MULTI-TENANCY SERVICES IN CLOUD}} , author={{ ZhaohaiZhang } and { QiaoyanWen }} , year={2012} , publisher={IEEE} } @book{b15, , title={{Fuzzy Authorization for Cloud Storage}} , author={{ ShashaZhu } and { GuangGong }} , year={2013} , publisher={IEEE} } @incollection{b16, , title={{An Authentication and Authorization Solution for a Multiplatform Cloud Environment}} , journal={{Information Security Journal: A Global Perspective}} , editor={Primo? Cigoj & Borka Jerman Bla?i ?.} , year={2015} } @incollection{b17, , title={{An Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space}} , author={{ ManoharVasantrao Rathod } and { ProfS GVaidya }} , journal={{International Journal & Magazine of Engineering}} , editor={Jannu. Prasanna Krishna, Macha. Ganesh Kumar.} 19 4 , year={2015. 2015} , note={Management and Research} } @book{b18, , title={{Local Authentication and Authorization System for Immediate Setup of Cloud Environments}} , author={{ AlexanderStanik } and { PatrickBittner } and { MarvinByfield } and { FridtjofSander } and { DanielSch¨oder }} , year={2013} , publisher={IEEE} } @book{b19, , title={{Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program}} , author={{ XuanHungLe } and { TerryDoll } and { MonicaBarbosu } and { AmnerisLuque } and { DongwenWang }} , year={2013} , publisher={ELsevier} } @book{b20, , title={{Cloud Police: Taking Access Control out of the Network}} , author={{ LucianPopa } and { MinlanYu } and { YSteven } and { Ko }} , year={2010} , publisher={ACM} } @incollection{b21, , title={{Privacy Preserving Access Control with Authentication for Securing Data in Clouds}} , author={{ SushmitaRuj } and { MilosStojmenovic }} , journal={{Amiya Nayak}} , year={2012} , publisher={IEEE} } @incollection{b22, , title={{Rule-Based Run-Time Information Flow Control in Service Cloud}} , author={{ WeiShe } and { I-LingYen } and { BhavaniThuraisingham }} , journal={{IEEE}} , year={2011} } @book{b23, , title={{How to Use Attribute-Based Encryption to Implement Rolebased Access Control in the Cloud}} , author={{ YanZhu } and { ChangjunHu } and { DiMa } and { JinLi }} , year={2013} , publisher={ACM} } @incollection{b24, , title={{Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds}} , author={{ SushmitaRuj } and { MilosStojmenovic }} , journal={{Amiya Nayak}} 25 2 , year={2014} , note={IEEE.} } @book{b25, , title={{Privacy-preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking}} , author={{ WenhaiSun } and { BingWang } and { NingCao } and { MingLi } and { WenjingLou } and { YThomasHou }} , year={2013} , publisher={ACM} } @book{b26, , title={{A purpose-based access control in native XML databases}} , author={{ LiliSun } and { HuaWang }} , year={2011} , publisher={John Wiley & Sons} , address={Ltd} } @book{b27, , title={{Constraining Credential Usage in Logic-Based Access Control}} , author={{ LujoBauer } and { LiminJia } and { DivyaSharma }} , year={2010} , publisher={IEEE} } @book{b28, , title={{A fine-grained access control and revocation scheme on clouds}} , author={{ Shan-ShanTu } and { Shao-ZhangNiu } and { HuiLi }} , year={2012} , publisher={John Wiley & Sons} , address={Ltd} } @incollection{b29, , title={{A Policy-Based Dialogue System for Physical Access Control}} , author={{ MohammadAbabneh } and { DumindaWijesekera }} , journal={{James Bret Michael}} , year={2012} , publisher={IEEE} } @book{b30, , title={{Applying a usage control model in an operating system kernel}} , author={{ RafaelTeigao } and { CarlosMaziero }} , year={2011} , publisher={Elsevier} 24 } @book{b31, , title={{Constraining Credential Usage in Logic-Based Access Control}} , author={{ LujoBauer } and { LiminJia } and { DivyaSharma }} , year={2010} , publisher={IEEE} } @incollection{b32, , title={{A Secured Cloud based Health Care Data Management System}} , journal={{International Journal of Computer Applications}} , editor={Md. Fakhrul Alam Onik, Syed Sabir Salman-Al-Musawi, Khairul Anam, Nafiul Rashid.} 49 12 , year={2012} } @book{b33, , title={{CPBAC: Property-based access control model for secure cooperation in online social networks}} , author={{ YounaJung A } and { BDJames } and { Joshi }} , year={2014} , publisher={ELsevier} 41 } @incollection{b34, , title={{Sec Agreement: Advancing Security Risk Calculations in Cloud Services}} , author={{ LMatthew } and { Hale Rose } and { Gamble }} , journal={{IEEE}} , year={2012} } @book{b35, , title={{Cryptography Challenges for Computational Privacy in Public Clouds}} , author={{ SashankDara }} , year={2013} , publisher={ACM} } @incollection{b36, , title={{Controlled Privacy in Mobile Cloud}} , author={{ DebasishJana } and { DebasisBandyopadhyay }} , journal={{IEEE}} , year={2015} } @incollection{b37, , title={{Cloud Based Smart Metering Security Access and Monitoring System in the Real Time Environment}} , journal={{International Journal of Engineering Research & Technology}} , editor={Nageshwar Dev yadav,Prof. Akash Wanjari.} 3 2 , year={2014} } @incollection{b38, , title={{A Policy-Based Dialogue System for Physical Access Control}} , author={{ MohammadAbabneh } and { DumindaWijesekera }} , journal={{James Bret Michael}} , year={2012} , publisher={IEEE} } @book{b39, , title={{Attribute Based Access Control and Implementation in Infrastructure as a Service Cloud}} , author={{ XinJin }} , year={2014} } @book{b40, , title={{From ABAC to ZBAC: The Evolution of Access Control Models}} , author={{ AlanHKarp } and { HarryHaury } and { MichaelHDavis }} , year={2009} }