메뉴 건너뛰기




Volumn , Issue , 2011, Pages 111-116

The case for dynamic security solutions in public cloud workflow deployments

Author keywords

cloud computing; dynamic decision making; information security; workflow

Indexed keywords

APPLICATION EXECUTION; BUSINESS RULES; CLOUD PROCESSING; COST BENEFITS; CRITICAL ISSUES; DATA STORAGE; DYNAMIC DECISION MAKING; DYNAMIC SECURITY; ENTERPRISE SECURITY; GLOBAL SECURITY; POSSIBLE SOLUTIONS; RUNNING APPLICATIONS; SCIENTIFIC COMMUNITY; SECURITY ISSUES; WORK-FLOWS; WORKFLOW;

EID: 80052175981     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSNW.2011.5958795     Document Type: Conference Paper
Times cited : (31)

References (26)
  • 2
    • 78149238589 scopus 로고    scopus 로고
    • Cloud computing: The limits of public clouds for business applications
    • Nov./Dec.
    • P. Hofmann and D. Woods. "Cloud Computing: The Limits of Public Clouds for Business Applications." IEEE Internet Computing, vol.14, no. 6, pp. 90-93, Nov./Dec. 2010.
    • (2010) IEEE Internet Computing , vol.14 , Issue.6 , pp. 90-93
    • Hofmann, P.1    Woods, D.2
  • 5
    • 78349299500 scopus 로고    scopus 로고
    • The management of security in cloud computing
    • S. Ramgovind, M.M. Eloff and E. Smith. "The Management of Security in Cloud Computing" In Proc. ISSA, 2010, pp. 1-7.
    • (2010) Proc. ISSA , pp. 1-7
    • Ramgovind, S.1    Eloff, M.M.2    Smith, E.3
  • 7
    • 34249989942 scopus 로고    scopus 로고
    • A coherent strategy for data security through data governance
    • DOI 10.1109/MSP.2007.51
    • R.L. Trope, E.M. Power, V.I. Polley and B.C.Morley. "A Coherent Strategy for Data Security through Data Governance." IEEE Security & Privacy, vol. 5, no. 3, pp. 32-39, May/Jun. 2007. (Pubitemid 46883432)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 32-39
    • Trope, R.L.1    Power, E.M.2    Polley, V.I.3    Morley, B.C.4
  • 9
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Nov./Dec.
    • H. Takabi, J.B.D. Joshi and G.J. Ahn. "Security and Privacy Challenges in Cloud Computing Environments." IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.J.3
  • 11
    • 77955712658 scopus 로고    scopus 로고
    • Toward dynamic and attribute based publication, discovery and selection for cloud computing
    • Jul.
    • A. Goscinski and M. Brock. "Toward dynamic and attribute based publication, discovery and selection for cloud computing." Future Generation Computer Systems, vol. 26, no. 7, pp. 947-970, Jul. 2010.
    • (2010) Future Generation Computer Systems , vol.26 , Issue.7 , pp. 947-970
    • Goscinski, A.1    Brock, M.2
  • 14
    • 15744374605 scopus 로고    scopus 로고
    • Multilevel security and information flow in petri net workflows
    • K. Knorr. "Multilevel Security and Information Flow in Petri Net Workflows." In Proc. ICTSM, 2001, pp. 9-20.
    • (2001) Proc. ICTSM , pp. 9-20
    • Knorr, K.1
  • 15
    • 63249084376 scopus 로고    scopus 로고
    • Verification of workflow processes under multilevel security considerations
    • K. Barkaoui, R.B. Ayed, H. Boucheneb and A. Hicheur. "Verification of Workflow Processes Under Multilevel Security Considerations." In Proc. CRiSIS, 2008, pp. 77-84.
    • (2008) Proc. CRiSIS , pp. 77-84
    • Barkaoui, K.1    Ayed, R.B.2    Boucheneb, H.3    Hicheur, A.4
  • 16
    • 78651374724 scopus 로고    scopus 로고
    • Identification of a companys suitability for the adoption of cloud computing and modeling its corresponding Return on Investment
    • Feb.
    • S.C. Misra and A. Mondal. "Identification of a companys suitability for the adoption of cloud computing and modeling its corresponding Return on Investment." Mathematical and Computer Modelling, vol. 53, no. 3-4, pp. 504-521, Feb. 2011.
    • (2011) Mathematical and Computer Modelling , vol.53 , Issue.3-4 , pp. 504-521
    • Misra, S.C.1    Mondal, A.2
  • 17
    • 38049152588 scopus 로고    scopus 로고
    • Usability challenges in security and privacy policy-authoring interfaces
    • R.W. Reeder, C.M. Karat, J. Karat and C Brodie."Usability Challenges in Security and Privacy Policy-Authoring Interfaces." In Proc. INTERACT, 2007, pp. 141-155.
    • (2007) Proc. INTERACT , pp. 141-155
    • Reeder, R.W.1    Karat, C.M.2    Karat, J.3    Brodie, C.4
  • 18
    • 79951875368 scopus 로고    scopus 로고
    • Optimizing a policy authoring framework for security and privacy policies
    • article 8
    • M. Johnson, J. Karat, C.M. Karat and K. Grueneberg. "Optimizing a Policy Authoring Framework for Security and Privacy Policies." In Proc. SOUPS, 2010, article 8.
    • (2010) Proc. SOUPS
    • Johnson, M.1    Karat, J.2    Karat, C.M.3    Grueneberg, K.4
  • 21
    • 70349657130 scopus 로고    scopus 로고
    • Deploying security policy in intra and inter workflow management systems
    • S. Ayed, N. Cuppens-Boulahia and F. Cuppens. "Deploying Security Policy in Intra and Inter Workflow Management Systems." In Proc. ARES, 2009, pp. 58-65.
    • (2009) Proc. ARES , pp. 58-65
    • Ayed, S.1    Cuppens-Boulahia, N.2    Cuppens, F.3
  • 22
    • 78650276567 scopus 로고    scopus 로고
    • Composable cost estimation and monitoring for computational applications in cloud computing environments
    • H.L. Truong and S. Dustdar. "Composable Cost Estimation and Monitoring for Computational Applications in Cloud Computing Environments." In Proc. ICCS, 2010, pp. 2175-2184.
    • (2010) Proc. ICCS , pp. 2175-2184
    • Truong, H.L.1    Dustdar, S.2
  • 24
    • 84876359591 scopus 로고    scopus 로고
    • Auditing workflow execution against dataflow policies
    • R. Accorsi and C. Wonnemann. "Auditing Workflow Execution against Dataflow Policies." In Proc. BIS, 2010, pp. 207-217.
    • (2010) Proc. BIS , pp. 207-217
    • Accorsi, R.1    Wonnemann, C.2
  • 26
    • 35248864467 scopus 로고    scopus 로고
    • Handling dynamic changes in decentralized workflow execution environments
    • V. Atluri and S.A. Chun. "Handling Dynamic Changes in Decentralized Workflow Execution Environments." In Proc. DEXA, 2003, pp. 813-825.
    • (2003) Proc. DEXA , pp. 813-825
    • Atluri, V.1    Chun, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.