Читать книгу The Internet of Medical Things (IoMT) - Группа авторов - Страница 50
2.2.1.11 Authority
ОглавлениеThe integrity of cloud computing needs an important information security to maintain relevant authority. It follows the following controls and privileges in the process stream in cloud computing. The rights management system should ensure that each role (including metadata) can see the need to obtain the data function. Access control should be based and the established role goes on and officers should be reviewed regularly. In general, the model of least privilege should be used, and the user and administrator only have the necessary rights for the CSP to enable them to achieve their functions [14].