-
1
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J.B.D. Joshi, and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security & Privacy, vol. 8, no. 6, 2010, pp. 24-31.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
2
-
-
74049152260
-
Hey you get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart et al., "Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM, 2009, pp. 199-212.
-
(2009)
Proc. 16th ACM Conf. Computer and Communications Security CCS 09
, pp. 199-212
-
-
Ristenpart, T.1
-
4
-
-
77954983075
-
Security for the cloud infrastructure: Trusted virtual data center implementation
-
S. Berger et al., "Security for the Cloud Infrastructure: Trusted Virtual Data Center Implementation," IBM J. Research and Devel- opment, vol. 53, no. 4, 2009, pp. 560-571.
-
(2009)
IBM J. Research and Devel- Opment
, vol.53
, Issue.4
, pp. 560-571
-
-
Berger, S.1
-
5
-
-
78650059341
-
Toward a mul-titenancy authorization system for cloud services
-
J.M. Alcaraz Calero et al., "Toward a Mul- titenancy Authorization System for Cloud Services," IEEE Security & Privacy, vol. 8, no. 6, 2010, pp. 48-55.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 48-55
-
-
Alcaraz Calero, J.M.1
-
6
-
-
33947157642
-
X- federate: A policy engineering framework for federated access management
-
R. Bhatti, E. Bertino, and A. Ghafoor, "X- Federate: A Policy Engineering Framework for Federated Access Management," IEEE Trans. Software Eng., vol. 32, no. 5, 2006, pp. 330-346.
-
(2006)
IEEE Trans. Software Eng.
, vol.32
, Issue.5
, pp. 330-346
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
7
-
-
0003502331
-
Noninterference transitivity channel-control security policies tech
-
report CSL-92-02 SRI Intl
-
J. Rushby, Noninterference, Transitivity, and Channel-Control Security Policies, tech. report CSL-92-02, Computer Science Lab, SRI Int'l, 1992.
-
(1992)
Computer Science Lab
-
-
Rushby, J.1
-
8
-
-
28244460211
-
Secure interoperation in a multidomain environment employing RBAC policies
-
DOI 10.1109/TKDE.2005.185
-
B. Shafi q et al., "Secure Interoperation in a Multidomain Environment Employing RBAC Policies," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 11, 2005, pp. 1557-1577. (Pubitemid 41704842)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
9
-
-
0033698475
-
ALCOA: The alloy constraint analyzer
-
ACM
-
D. Jackson, I. Schechter, and I. Shlyakhter, "ALCOA: The Alloy Constraint Analyzer," Proc. 22nd Int'l Conf. Software Eng., ACM, 2000, pp. 730-733.
-
(2000)
Proc. 22nd Intl. Conf. Software Eng.
, pp. 730-733
-
-
Jackson, D.1
Schechter, I.2
Shlyakhter, I.3
-
10
-
-
84855763363
-
Visual analytics decision support environ-ment for epidemic modeling and response evaluation
-
VAST 11 IEEE CS
-
S. Afzal, R. Maciejewski, and D.S. Ebert, "Visual Analytics Decision Support Environ- ment for Epidemic Modeling and Response Evaluation," IEEE Conf. Visual Analytics Science and Technology (VAST 11), IEEE CS, 2011, pp. 191-200.
-
(2011)
IEEE Conf. Visual Analytics Science and Technology
, pp. 191-200
-
-
Afzal, S.1
MacIejewski, R.2
Ebert, D.S.3
|