Skip to main navigation
Skip to search
Skip to main content
Illinois Experts Home
LOGIN & Help
Home
Profiles
Research units
Research & Scholarship
Datasets
Honors
Press/Media
Activities
Search by expertise, name or affiliation
Towards secure provenance-based access control in cloud environments
Adam Bates
, Ben Mood
, Masoud Valafar
, Kevin Butler
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Towards secure provenance-based access control in cloud environments'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Access Control
100%
Cloud Environment
100%
Access Control in Cloud
100%
Secure Provenance
100%
Storage Requirement
33%
Data Storage
33%
Insecurity
33%
Regulatory Policy
33%
Cumulus Clouds
33%
Fine Granularity
33%
Control Decision
33%
Data Migration
33%
Cloud Computing
33%
Critical Security
33%
Cloud System
33%
Provenance Data
33%
Access Control Mechanism
33%
Cloud Storage
33%
Overhead Costs
33%
Provenance-aware
33%
Geographic Boundaries
33%
Secure Management
33%
Distributed Management
33%
Computer Science
Access Control
100%
Cloud Environment
100%
Storage Requirement
33%
Fine Granularity
33%
Data Migration
33%
Information Storage
33%
Critical Application
33%
Access Control Policies
33%
cloud system
33%
Access Control Decision
33%
Cloud Storage
33%
Regulatory Policy
33%
Cloud Computing
33%