메뉴 건너뛰기




Volumn 8, Issue 6, 2010, Pages 24-31

Security and privacy challenges in cloud computing environments

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; SECURITY AND PRIVACY; SECURITY AND PRIVACY ISSUES;

EID: 78650065157     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.186     Document Type: Article
Times cited : (1024)

References (15)
  • 3
    • 78650072669 scopus 로고    scopus 로고
    • Cloud computing: Privacy, security challenges
    • P. J. Bruening and B. C. Treacy, "Cloud Computing: Privacy, Security Challenges, " Bureau of Nat'l Afairs, 2009; www.hunton.com/files/tbl- s47Details/FileUpload 265/2488/CloudComputing-Bruening-Treacy.pdf.
    • (2009) Bureau of Nat'l Afairs
    • Bruening, P.J.1    Treacy, B.C.2
  • 5
    • 77954327465 scopus 로고    scopus 로고
    • tech. report UCB/EECS-2010-5, EECS Dept., Univ. of California, Berkeley
    • Y. Chen, V. Paxson, and R. H. Katz, "What's New About Cloud Computing Security?" tech. report UCB/EECS-2010-5, EECS Dept., Univ. of California, Berkeley, 2010; www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010- 5.html.
    • (2010) What's New About Cloud Computing Security?
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 7
  • 8
    • 11044223672 scopus 로고    scopus 로고
    • Access control language for multidomain environments
    • J. Joshi et al., "Access Control Language for Multidomain Environments, " IEEE Internet Computing, vol. 8, no. 6, 2004, pp. 40-50.
    • (2004) IEEE Internet Computing , vol.8 , Issue.6 , pp. 40-50
    • Joshi, J.1
  • 9
    • 61449159887 scopus 로고    scopus 로고
    • Dynamic trust management
    • M. Blaze et al., "Dynamic Trust Management, " Computer, vol. 42, no. 2, 2009, pp. 44-52.
    • (2009) Computer , vol.42 , Issue.2 , pp. 44-52
    • Blaze, M.1
  • 10
    • 78650039216 scopus 로고    scopus 로고
    • Access control and trust management for emerging multidomain environments
    • S. Upadhyaya and R. O. Rao, eds., Emerald Group Publishing
    • Y. Zhang and J. Joshi, "Access Control and Trust Management for Emerging Multidomain Environments, " Annals of Emerging Research in Information Assurance, Security and Privacy Services, S. Upadhyaya and R. O. Rao, eds., Emerald Group Publishing, 2009, pp. 421-452.
    • (2009) Annals of Emerging Research in Information Assurance, Security and Privacy Services , pp. 421-452
    • Zhang, Y.1    Joshi, J.2
  • 11
    • 31544451249 scopus 로고    scopus 로고
    • Role-based privilege and trust management
    • D. Shin and G.-J. Ahn, "Role-Based Privilege and Trust Management, " Computer Systems Science & Eng. J., vol. 20, no. 6, 2005, pp. 401-410.
    • (2005) Computer Systems Science & Eng. J. , vol.20 , Issue.6 , pp. 401-410
    • Shin, D.1    Ahn, G.-J.2
  • 12
    • 77954936501 scopus 로고    scopus 로고
    • StateMiner: An efcient similarity-based approach for optimal mining of role hierarchy
    • ACM Press
    • H. Takabi and J. Joshi, "StateMiner: An Efcient Similarity-Based Approach for Optimal Mining of Role Hierarchy, " Proc. 15th ACM Symp. Access Control Models and Technologies, ACM Press, 2010, pp. 55-64.
    • (2010) Proc. 15th ACM Symp. Access Control Models and Technologies , pp. 55-64
    • Takabi, H.1    Joshi, J.2
  • 14
  • 15
    • 74049124413 scopus 로고    scopus 로고
    • An architecture for specifcation and enforcement of temporal access control constraints using OWL
    • ACM Press
    • H. Takabi et al., "An Architecture for Specifcation and Enforcement of Temporal Access Control Constraints using OWL, " Proc. 2009 ACM Workshop on Secure Web Services, ACM Press, 2009, pp. 21-28.
    • (2009) Proc. 2009 ACM Workshop on Secure Web Services , pp. 21-28
    • Takabi, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.