id author title date pages extension mime words sentences flesch summary cache txt work_qg4vx3n3gjbmbihwvtuna3xnkm Yuchen Wu Research on Trust-Role Access Control Model in Cloud Computing 2019 6 .pdf application/pdf 2898 217 57 Research on Trust-Role Access Control Model in Cloud computing, a trust-role-based hybrid cloud computing access role-based and trust-based access control models. access control, that is, the user needs to verify the trust value The trust-based access control model has good As the number of user requests increases, both access control larger than the role-based access control method in terms of Keywords-Cloud Computing Access Control; Data Security; trust in the role-based access control method, and trust in the role-based access control method, and B. Role-Based Access Control Method In the role-based access control (RBAC) model, the Definition 1 Entity User: Access data in a cloud D. Trust-role-based access control algorithm BASED ON THE "TRUST-ROLE" ACCESS CONTROL proposes the access control model based on trust-role, control model based on "trust-role" and the access throughput than the role-based access control method. role access control based on trust degree in grid computing [J]. ./cache/work_qg4vx3n3gjbmbihwvtuna3xnkm.pdf ./txt/work_qg4vx3n3gjbmbihwvtuna3xnkm.txt