-
3
-
-
78650072669
-
Cloud computing: Privacy, security challenges
-
P. J. Bruening and B. C. Treacy, "Cloud Computing: Privacy, Security Challenges, " Bureau of Nat'l Afairs, 2009; www.hunton.com/files/tbl- s47Details/FileUpload 265/2488/CloudComputing-Bruening-Treacy.pdf.
-
(2009)
Bureau of Nat'l Afairs
-
-
Bruening, P.J.1
Treacy, B.C.2
-
4
-
-
78649806730
-
SecureCloud: Towards a comprehensive security framework for cloud computing environments
-
CloudApp 2010, IEEE CS Press
-
H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments, " Proc. 1st IEEE Int'l Workshop Emerging Applications for Cloud Computing (CloudApp 2010), IEEE CS Press, 2010, pp. 393-398.
-
(2010)
Proc. 1st IEEE Int'l Workshop Emerging Applications for Cloud Computing
, pp. 393-398
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
5
-
-
77954327465
-
-
tech. report UCB/EECS-2010-5, EECS Dept., Univ. of California, Berkeley
-
Y. Chen, V. Paxson, and R. H. Katz, "What's New About Cloud Computing Security?" tech. report UCB/EECS-2010-5, EECS Dept., Univ. of California, Berkeley, 2010; www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010- 5.html.
-
(2010)
What's New About Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
6
-
-
74049122943
-
Privacy-preserving digital identity management for cloud computing
-
Mar
-
E. Bertino, F. Paci, and R. Ferrini, "Privacy-Preserving Digital Identity Management for Cloud Computing, " IEEE Computer Society Data Engineering Bulletin, Mar. 2009, pp. 1-4.
-
(2009)
IEEE Computer Society Data Engineering Bulletin
, pp. 1-4
-
-
Bertino, E.1
Paci, F.2
Ferrini, R.3
-
7
-
-
70449553983
-
Privacy-enhanced user-centric identity management
-
IEEE Press
-
M. Ko, G.-J. Ahn, and M. Shehab "Privacy-Enhanced User-Centric Identity Management, " Proc. IEEE Int'l Conf. Communications, IEEE Press, 2009, pp. 998-1002.
-
(2009)
Proc. IEEE Int'l Conf. Communications
, pp. 998-1002
-
-
Ko, M.1
Ahn, G.-J.2
Shehab, M.3
-
8
-
-
11044223672
-
Access control language for multidomain environments
-
J. Joshi et al., "Access Control Language for Multidomain Environments, " IEEE Internet Computing, vol. 8, no. 6, 2004, pp. 40-50.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.1
-
9
-
-
61449159887
-
Dynamic trust management
-
M. Blaze et al., "Dynamic Trust Management, " Computer, vol. 42, no. 2, 2009, pp. 44-52.
-
(2009)
Computer
, vol.42
, Issue.2
, pp. 44-52
-
-
Blaze, M.1
-
10
-
-
78650039216
-
Access control and trust management for emerging multidomain environments
-
S. Upadhyaya and R. O. Rao, eds., Emerald Group Publishing
-
Y. Zhang and J. Joshi, "Access Control and Trust Management for Emerging Multidomain Environments, " Annals of Emerging Research in Information Assurance, Security and Privacy Services, S. Upadhyaya and R. O. Rao, eds., Emerald Group Publishing, 2009, pp. 421-452.
-
(2009)
Annals of Emerging Research in Information Assurance, Security and Privacy Services
, pp. 421-452
-
-
Zhang, Y.1
Joshi, J.2
-
11
-
-
31544451249
-
Role-based privilege and trust management
-
D. Shin and G.-J. Ahn, "Role-Based Privilege and Trust Management, " Computer Systems Science & Eng. J., vol. 20, no. 6, 2005, pp. 401-410.
-
(2005)
Computer Systems Science & Eng. J.
, vol.20
, Issue.6
, pp. 401-410
-
-
Shin, D.1
Ahn, G.-J.2
-
12
-
-
77954936501
-
StateMiner: An efcient similarity-based approach for optimal mining of role hierarchy
-
ACM Press
-
H. Takabi and J. Joshi, "StateMiner: An Efcient Similarity-Based Approach for Optimal Mining of Role Hierarchy, " Proc. 15th ACM Symp. Access Control Models and Technologies, ACM Press, 2010, pp. 55-64.
-
(2010)
Proc. 15th ACM Symp. Access Control Models and Technologies
, pp. 55-64
-
-
Takabi, H.1
Joshi, J.2
-
13
-
-
69549105973
-
Security-enhanced OSGi service environments
-
G.-J. Ahn, H. Hu, and J. Jin, "Security-Enhanced OSGi Service Environments, " IEEE Trans. Systems, Man, and Cybernetics-Part C: Applications and Reviews, vol. 39, no. 5, 2009, pp. 562-571.
-
(2009)
IEEE Trans. Systems, Man, and Cybernetics-Part C: Applications and Reviews
, vol.39
, Issue.5
, pp. 562-571
-
-
Ahn, G.-J.1
Hu, H.2
Jin, J.3
-
14
-
-
34748829785
-
Managing heterogeneous network environments using an extensible policy framework
-
DOI 10.1145/1229285.1229328, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
L. Teo and G.-J. Ahn, "Managing Heterogeneous Network Environments Using an Extensible Policy Framework, " Proc. Asian ACM Symp. Information, Computer and Communications Security, ACM Press, 2007, pp. 362-364. (Pubitemid 47479251)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 362-364
-
-
Teo, L.1
Ahn, G.-J.2
-
15
-
-
74049124413
-
An architecture for specifcation and enforcement of temporal access control constraints using OWL
-
ACM Press
-
H. Takabi et al., "An Architecture for Specifcation and Enforcement of Temporal Access Control Constraints using OWL, " Proc. 2009 ACM Workshop on Secure Web Services, ACM Press, 2009, pp. 21-28.
-
(2009)
Proc. 2009 ACM Workshop on Secure Web Services
, pp. 21-28
-
-
Takabi, H.1
|