[1] Rashidi , A.J,Rezakhani , A., 2016.“A new approach to ranking attributes in attribute based access control using decision fusion”,Neural Computing and Applications 1 -10
[2] Nakhjiri , M,Nakhjiri , M., 2005.AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility”, -
[3] Bertino , E,G,A., 2011.Access Control for Databases: Concepts and Systems”, 3 1 -148
[4] Sansorg., 2016.,Sansorg. Retrieved 17 June -
[5] Habiba, 2016.“A New Approach to Access Control in Cloud”,Arabian Journal for Science and Engineering 41 1015 -1030
[6] Armando , A., 2015.Balancing Trust and Risk in Access Control”,On the Move to Meaningful Internet Systems: OTM 2015 Conferences 660 -676
[7] Voon , M.J., 2016.Campus Access Control and Management System”,Intelligent and Evolutionary Systems 395 -404
[8] Rajpoot , Q.M., 2015.Attributes Enhanced Role-Based Access Control Model”,Trust, Privacy and Security in Digital Business 3 -17
[9] Penubaku , L., 2015.“Access Control System Which Uses Human Behavioral Profiling for Authentication”,Advances in Signal Processing and Intelligent Recognition Systems 419 -430
[10] Gupta , N,A & Tripathi,R., 2015.Medium access control protocols for safety applications in Vehicular Ad-Hoc Network: A classification and comprehensive survey”,Vehicular Communications 2 223 -237
[11] Chu, 2015.“Application of reinforcement learning to medium access control for wireless sensor networks”,Engineering Applications of Artificial Intelligence 49 23 -32
[12] Li, 2015.Robust access control framework for mobile cloud computing network”,Computer Communications 68 61 -72
[13] Majumder , A.,Mahmood, 2014.Taxonomy and Classification of Access Control Models for Cloud Environments”,Continued Rise of the Cloud 23 -53
[14] Aluvalu , R., 2015.A Survey on Access Control Models in Cloud Computing”,Emerging ICT for Bridging the Future - Proceedings of the 49th Annual 1 2 3 4 5 Convention of the Computer Society of India 653 -664
[15] 2003.Secretariat information technology industry council (iti),, “Role Based Access Control”. : American National Standard for Information Technology (NIST) -
[16] Sharma et al., AMTRAC:, 2013.An administrative model for temporal role-based access control,Computers & Security 39 201 -218
[17] Chen , L.,C & Fernandez-gago, 2012.Risk-Aware Role-Based Access Control”,Security and Trust Management 140 -156
[18] Salim, 2013.,Budget-aware Role Based Access Control. Computers & Security 35 37 -50
[19] VincentC.,Hu, 2014.Guide to Attribute Based Access Control (ABAC) Definition and Considerations”,USA: NIST Special Publication 800-162 -
[20] Smari , W,P,J., 2014.An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system,Future Generation Computer Systems” 31 147 -168
[21] Almutairi , A,M & Ghafoor,A., 2015.Risk-Aware Management of Virtual Resources in Access Controlled Service-oriented Cloud Datacenters”,PP(99) -
[22] Wu , J., 2005.Authorization-authentication using XACML and SAML”, -
[23] Isoorg, 2016.,htm?csnumber=1819 9 -
[24] Zhou , L,H,J., 2013.Continuous Ordered Weighted Distance Measure and Its Application to Multiple Attribute Group Decision Making”,Group Decision and Negotiation 22 739 -758