메뉴 건너뛰기




Volumn 25 LNICST, Issue , 2010, Pages 19-26

On the definition of access control requirements for grid and cloud computing systems

Author keywords

Access control; Cloud computing; Grid computing; Security requirements engineering

Indexed keywords

COMPLEX ENVIRONMENTS; CONTROL APPROACH; CONTROL REQUIREMENTS; GRID AND CLOUD COMPUTING; HOLISTIC APPROACH; SECURITY REQUIREMENTS ENGINEERING; TRADITIONAL SYSTEMS;

EID: 79551535025     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-11733-6_3     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 4
    • 35248873795 scopus 로고    scopus 로고
    • Usage control: A vision for next generation access control
    • Sandhu, R., Park, J.: Usage control: A vision for next generation access control. Computer Network Security, 17-31 (2003).
    • (2003) Computer Network Security , vol.17-31
    • Sandhu, R.1    Park, J.2
  • 5
    • 38949184514 scopus 로고    scopus 로고
    • Toward a usage-based security framework for collaborative computing systems
    • Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11(1), 1-36 (2008).
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.11 , Issue.1 , pp. 1-36
    • Zhang, X.1    Nakae, M.2    Covington, M.J.3    Sandhu, R.4
  • 6
    • 33749080076 scopus 로고    scopus 로고
    • Attributed Based Access Control (ABAC) for web services
    • DOI 10.1109/ICWS.2005.25, 1530847, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
    • Yuan, E., Tong, J.: Attributed Based Access Control (ABAC) for Web Services. In: Proceedings of the IEEE ICWS, pp. 561-569. IEEE Computer Society, Los Alamitos (2005). (Pubitemid 44460249)
    • (2005) Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005 , vol.2005 , pp. 561-569
    • Yuan, E.1    Tong, J.2
  • 7
    • 84885885488 scopus 로고    scopus 로고
    • Authrule: A generic rule-based authorization module
    • Springer, Heidelberg
    • Busch, S., Muschall, B., Pernul, G., Priebe, T.: Authrule: A generic rule-based authorization module, DBSec. Springer, Heidelberg (2006).
    • (2006) DBSec.
    • Busch, S.1    Muschall, B.2    Pernul, G.3    Priebe, T.4
  • 10
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with X.509 attribute certificates
    • Chadwick, D.W., Otenko, A., Ball, E.: Role-based access control with X.509 attribute certificates. IEEE Internet Computing 7(2), 62-69 (2003).
    • (2003) IEEE Internet Computing , vol.7 , Issue.2 , pp. 62-69
    • Chadwick, D.W.1    Otenko, A.2    Ball, E.3
  • 11
    • 84885885761 scopus 로고    scopus 로고
    • GridTrust: Gridtrust (2009), http://www.gridtrust.eu/gridtrust.
    • (2009) GridTrust: Gridtrust
  • 12
    • 33750945474 scopus 로고    scopus 로고
    • Supporting attribute-based access control with ontologies
    • DOI 10.1109/ARES.2006.127, 1625344, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
    • Priebe, T., Dobmeier, W., Kamprath, N.: Supporting attribute-based access control with ontologies. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 465-472. IEEE Computer Society, Los Alamitos (2006). (Pubitemid 44732678)
    • (2006) Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006 , vol.2006 , pp. 465-472
    • Priebe, T.1    Dobmeier, W.2    Kamprath, N.3
  • 14
  • 15
  • 16
    • 84885884541 scopus 로고    scopus 로고
    • SETI@home (2009), http://setiathome.ssl.berkeley.edu/.
    • (2009) SETI@home
  • 21
    • 0036468389 scopus 로고    scopus 로고
    • A taxonomy and survey of grid resource management systems for distributed computing
    • DOI 10.1002/spe.432
    • Krauter, K., Buyya, R., Maheswaran, M.: A taxonomy and survey of grid resource management systems for distributed computing. Softw. Pract. Exper. 32(2), 135-164 (2002). (Pubitemid 34138417)
    • (2002) Software - Practice and Experience , vol.32 , Issue.2 , pp. 135-164
    • Krauter, K.1    Buyya, R.2    Maheswaran, M.3
  • 22
    • 24944479276 scopus 로고    scopus 로고
    • A critical survey of grid security requirements and technologies
    • Oxford University Computing Laboratory
    • Broadfoot, P.J., Martin, A.P.: A critical survey of grid security requirements and technologies. Technical Report RR-03-15, Oxford University Computing Laboratory (2003).
    • (2003) Technical Report RR-03-15
    • Broadfoot, P.J.1    Martin, A.P.2
  • 25
    • 84885883377 scopus 로고    scopus 로고
    • LNCS, Springer, Heidelberg
    • Veit, D.J., Altmann, J. (eds.): GECON 2007. LNCS, vol. 4685. Springer, Heidelberg (2007).
    • (2007) GECON 2007 , vol.4685
    • Veit, D.J.1    Altmann, J.2
  • 26
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • DOI 10.1145/1057977.1057979
    • Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29-41 (2005). (Pubitemid 41246321)
    • (2005) ACM Computing Surveys , vol.37 , Issue.1 , pp. 29-41
    • Tolone, W.1    Ahn, G.-J.2    Pai, T.3    Hong, S.-P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.