Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
Author
Abstract
Suggested Citation
DOI: 10.1007/s13198-023-02112-x
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Urvashi Rahul Saxena & Taj Alam, 2023. "Role-based access using partial homomorphic encryption for securing cloud data," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(3), pages 950-966, June.
- Saim Kashmiri & Cameron Duncan Nicol & Liwu Hsu, 2017. "Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR," Journal of the Academy of Marketing Science, Springer, vol. 45(2), pages 208-228, March.
- Xu Jing & Zhengnan Liu & Shuqin Li & Bin Qiao & Gexu Tan, 2017. "A cloud-user behavior assessment based dynamic access control model," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 8(3), pages 1966-1975, November.
- Marta Meisner, 2017. "Financial Consequences Of Cyber Attacks Leading To Data Breaches In Healthcare Sector," Copernican Journal of Finance & Accounting, Uniwersytet Mikolaja Kopernika, vol. 6(3), pages 63-73.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Nan Zhang & Heng Xu, 2024. "Fairness of Ratemaking for Catastrophe Insurance: Lessons from Machine Learning," Information Systems Research, INFORMS, vol. 35(2), pages 469-488, June.
- Steffen Runge & Christian Schwens & Matthias Schulz, 2022. "The invention performance implications of coopetition: How technological, geographical, and product market overlaps shape learning and competitive tension in R&D alliances," Strategic Management Journal, Wiley Blackwell, vol. 43(2), pages 266-294, February.
- Zhang, Yimei & Smith, Thomas, 2023. "The impact of customer firm data breaches on the audit fees of their suppliers," International Journal of Accounting Information Systems, Elsevier, vol. 50(C).
- Wu, Zhenshu & Pownall, Rachel & Shih, Yi-Cheng & Wang, Yao, 2024. "Industry effects of corporate environmental and social scandals: Evidence from China," International Review of Financial Analysis, Elsevier, vol. 95(PC).
- Sylvie Héroux & Anne Fortin, 2020. "Cybersecurity Disclosure by the Companies on the S&P/TSX 60 Index," Accounting Perspectives, John Wiley & Sons, vol. 19(2), pages 73-100, June.
- Kimberly A. Whitler & Ali Besharat & Saim Kashmiri, 2021. "Exogenous brand crises: brand infection and contamination," Marketing Letters, Springer, vol. 32(1), pages 129-133, March.
- Manis, K.T. & Madhavaram, Sreedhar, 2023. "AI-Enabled marketing capabilities and the hierarchy of capabilities: Conceptualization, proposition development, and research avenues," Journal of Business Research, Elsevier, vol. 157(C).
- Nan Zhou & Heli Wang, 0. "Foreign subsidiary CSR as a buffer against parent firm reputation risk," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 0, pages 1-27.
- Ali Besharat & Kimberly A. Whitler & Saim Kashmiri, 2024. "When CEO Pay Becomes a Brand Problem," Journal of Business Ethics, Springer, vol. 190(4), pages 941-973, April.
- Dalia Hussein Elsayed & Tariq H. Ismail & Eman Adel Ahmed, 2024. "The impact of cybersecurity disclosure on banks’ performance: the moderating role of corporate governance in the MENA region," Future Business Journal, Springer, vol. 10(1), pages 1-15, December.
- Nan Zhou & Heli Wang, 2020. "Foreign subsidiary CSR as a buffer against parent firm reputation risk," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 51(8), pages 1256-1282, October.
- Edeling, Alexander & Srinivasan, Shuba & Hanssens, Dominique M., 2021. "The marketing–finance interface: A new integrative review of metrics, methods, and findings and an agenda for future research," International Journal of Research in Marketing, Elsevier, vol. 38(4), pages 857-876.
- Rajiv Kashyap & Mohamed Menisy & Peter Caiazzo & Jim Samuel, 2020. "Transparency versus Performance in Financial Markets: The Role of CSR Communications," Papers 2008.03443, arXiv.org.
- Chi Zhang & Saim Kashmiri & Melissa Cinelli, 2019. "How Does Brand Age Influence Consumer Attitudes Toward a Firm’s Unethical Behavior?," Journal of Business Ethics, Springer, vol. 158(3), pages 699-711, September.
- Confente, Ilenia & Siciliano, Giorgia Giusi & Gaudenzi, Barbara & Eickhoff, Matthias, 2019. "Effects of data breaches from user-generated content: A corporate reputation analysis," European Management Journal, Elsevier, vol. 37(4), pages 492-504.
- Feng, Cong & Fay, Scott, 2020. "Store Closings and Retailer Profitability: A Contingency Perspective," Journal of Retailing, Elsevier, vol. 96(3), pages 411-433.
- Rong Liu & Jiawei Yang & Jifei Wu, 2022. "When Big Data Backfires: The Impact of a Perceived Privacy Breach by Pharmaceutical E-Retailers on Customer Boycott Intention in China," IJERPH, MDPI, vol. 19(8), pages 1-13, April.
- Abhi Bhattacharya, 2023. "Consumer, bank, and stock market reaction to CFPB’s complaint data disclosure," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 28(1), pages 128-145, March.
- Fang, Xiang & Wang, Xiaoyu & Shao, Yingying & Banerjee, Pramit, 2024. "Examining the effect of a firm’s product recall on financial values of its competitors," Journal of Business Research, Elsevier, vol. 176(C).
- Uddin, Mohammad Rajib & Akter, Shahriar & Lee, Wai Jin Thomas, 2024. "Developing a data breach protection capability framework in retailing," International Journal of Production Economics, Elsevier, vol. 271(C).
More about this item
Keywords
Trust; Collusion attack; On–off attack; Sybil attack; DoS attack; Role-based access control;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:14:y:2023:i:6:d:10.1007_s13198-023-02112-x. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.