메뉴 건너뛰기




Volumn 29, Issue 2, 2012, Pages 36-44

A distributed access control architecture for cloud computing

Author keywords

cloud computing; distributed access control; multitenancy; resource virtualization; software engineering

Indexed keywords

DESIGN MODELS; DISTRIBUTED ACCESS CONTROL; DISTRIBUTED ACCESS CONTROLS; DISTRIBUTED ARCHITECTURE; MULTITENANCY; RESOURCE VIRTUALIZATION; SECURITY CHALLENGES; SECURITY MANAGEMENT; VIRTUALIZATIONS;

EID: 84857523561     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/MS.2011.153     Document Type: Article
Times cited : (128)

References (10)
  • 1
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • H. Takabi, J.B.D. Joshi, and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security & Privacy, vol. 8, no. 6, 2010, pp. 24-31.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 2
    • 74049152260 scopus 로고    scopus 로고
    • Hey you get off of my cloud: Exploring information leakage in third-party compute clouds
    • ACM
    • T. Ristenpart et al., "Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM, 2009, pp. 199-212.
    • (2009) Proc. 16th ACM Conf. Computer and Communications Security CCS 09 , pp. 199-212
    • Ristenpart, T.1
  • 4
    • 77954983075 scopus 로고    scopus 로고
    • Security for the cloud infrastructure: Trusted virtual data center implementation
    • S. Berger et al., "Security for the Cloud Infrastructure: Trusted Virtual Data Center Implementation," IBM J. Research and Devel- opment, vol. 53, no. 4, 2009, pp. 560-571.
    • (2009) IBM J. Research and Devel- Opment , vol.53 , Issue.4 , pp. 560-571
    • Berger, S.1
  • 5
    • 78650059341 scopus 로고    scopus 로고
    • Toward a mul-titenancy authorization system for cloud services
    • J.M. Alcaraz Calero et al., "Toward a Mul- titenancy Authorization System for Cloud Services," IEEE Security & Privacy, vol. 8, no. 6, 2010, pp. 48-55.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 48-55
    • Alcaraz Calero, J.M.1
  • 6
    • 33947157642 scopus 로고    scopus 로고
    • X- federate: A policy engineering framework for federated access management
    • R. Bhatti, E. Bertino, and A. Ghafoor, "X- Federate: A Policy Engineering Framework for Federated Access Management," IEEE Trans. Software Eng., vol. 32, no. 5, 2006, pp. 330-346.
    • (2006) IEEE Trans. Software Eng. , vol.32 , Issue.5 , pp. 330-346
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3
  • 7
    • 0003502331 scopus 로고
    • Noninterference transitivity channel-control security policies tech
    • report CSL-92-02 SRI Intl
    • J. Rushby, Noninterference, Transitivity, and Channel-Control Security Policies, tech. report CSL-92-02, Computer Science Lab, SRI Int'l, 1992.
    • (1992) Computer Science Lab
    • Rushby, J.1
  • 10
    • 84855763363 scopus 로고    scopus 로고
    • Visual analytics decision support environ-ment for epidemic modeling and response evaluation
    • VAST 11 IEEE CS
    • S. Afzal, R. Maciejewski, and D.S. Ebert, "Visual Analytics Decision Support Environ- ment for Epidemic Modeling and Response Evaluation," IEEE Conf. Visual Analytics Science and Technology (VAST 11), IEEE CS, 2011, pp. 191-200.
    • (2011) IEEE Conf. Visual Analytics Science and Technology , pp. 191-200
    • Afzal, S.1    MacIejewski, R.2    Ebert, D.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.