-
1
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
January
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review, Vol. 39 Issue 1, January 2009, pp. 50-55.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
2
-
-
77954051808
-
-
National Institute of Science and Technology, Retrieved 24 July
-
National Institute of Science and Technology. The NIST Definition of Cloud Computing (Draft). Retrieved 24 July 2011 from http//csrc.nist.gov/ publications/drafts/800-145/Draft-SP-800-145-cloud-definition.pdf.
-
(2011)
The NIST Definition of Cloud Computing (Draft)
-
-
-
4
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, On Technical Security Issues in Cloud Computing, 2009 IEEE International Conference on Cloud Computing, pp. 109-116.
-
2009 IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
5
-
-
84864063059
-
-
Retrieved 28 July, from
-
Cloud Security Alliance. Domain 12: Guidance for Identity & Access Management V2.1, Retrieved 28 July 2011 from https://cloudsecurityalliance.org/ wpcontent/uploads/2011/07/csaguide-dom12-v2.10.pdf.
-
(2011)
Domain 12: Guidance for Identity & Access Management V2.1
-
-
-
6
-
-
0002357382
-
Role based access control
-
Baltimore, MD, October
-
D. Ferraiolo and D.R. Kuhn, "Role Based Access Control, " Proceedings of the 15th Natl. Computer Security Conference, 1992, Baltimore, MD, October 1992, pp. 554-563.
-
(1992)
Proceedings of the 15th Natl. Computer Security Conference, 1992
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, D.R.2
-
7
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn and R. Chadramouli, "Proposed NIST Standard for Role-Based Access Control, " ACM Transactions Information and System Security, Vol. 4, No. 3, August 2001, pp. 224-274.
-
(2001)
ACM Transactions Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chadramouli, R.5
-
8
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models, " IEEE Computer, Vol. 29, No. 2, February 1996, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
9
-
-
4143121153
-
Access control and trust in the use of widely distributed services
-
Heidelberg, Germany, November, IEEE
-
J. Bacon, K. Moody and W. Yao, "Access Control and Trust in the Use of Widely Distributed Services, " Proceedings: Middleware 2001, Heidelberg, Germany, November 2001, IEEE, pp. 300-315.
-
(2001)
Proceedings: Middleware 2001
, pp. 300-315
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
10
-
-
84949684807
-
UML-based representation of role-based access control
-
Gaithersburg, Maryland, IEEE Computer Society
-
M. E. Shin and G. Ahn, "UML-Based Representation of Role-Based Access Control, " Proceedings: IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'00), Gaithersburg, Maryland, 2000, IEEE Computer Society, pp. 195-200.
-
(2000)
Proceedings: IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'00)
, pp. 195-200
-
-
Shin, M.E.1
Ahn, G.2
-
11
-
-
33646165214
-
A pattern language for security models
-
Retrieved 24 July 2011 from
-
E. B. Fernandez and R. Pan, "A Pattern Language for Security Models, " Conference on Pattern Languages of Programs (PLoP) 2001, Retrieved 24 July 2011 from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90. 5898&rep=rep1&type=pdf.
-
(2001)
Conference on Pattern Languages of Programs (PLoP)
-
-
Fernandez, E.B.1
Pan, R.2
-
12
-
-
27544454296
-
An access control model for secure cluster- computing environments
-
Big Island, HI, January 3-6
-
W. Li, E. Allen. An Access Control Model for Secure Cluster- Computing Environments. Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS'05). Big Island, HI, January 3-6, 2005, p. 309.
-
(2005)
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS'05)
, pp. 309
-
-
Li, W.1
Allen, E.2
-
13
-
-
77952176862
-
Cloud computing
-
Retrieved 24 July 2011 from
-
G. Boss, P. Malladi, D. Quan, L. Legregni, and H. Hall. Cloud computing. IBM White Paper, 2007, Retrieved 24 July 2011 from http://download.boulder.ibm. com/ibmdl/pub/software/dw/wes/hipods/Cloud-computing-wp-final-8Oct.pdf.
-
(2007)
IBM White Paper
-
-
Boss, G.1
Malladi, P.2
Quan, D.3
Legregni, L.4
Hall, H.5
-
14
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chadramouli, "Proposed NIST Standard for Role-Based Access Control, " ACM Transactions Information and System Security, Vol. 4, No. 3, August 2001, pp. 224-274.
-
(2001)
ACM Transactions Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chadramouli, R.5
-
16
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
EECS Dept. University of Califonia, Berkeley
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing", Tech. Report UCB/EECS-2009-28, EECS Dept., University of Califonia, Berkeley, 2009.
-
(2009)
Tech. Report UCB/EECS-2009-28
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
17
-
-
84864054799
-
An access control mechanism in cloud computing environments
-
October, Jinan, China, China Computer Federation
-
W. Li, S. Li, and H. Wan, "An Access Control Mechanism in Cloud Computing Environments, " Proceedings: 2011 National Annual High Performance Computing of China (HPC China 2011). October 2011, Jinan, China, China Computer Federation.
-
(2011)
Proceedings: 2011 National Annual High Performance Computing of China (HPC China 2011)
-
-
Li, W.1
Li, S.2
Wan, H.3
-
18
-
-
77954327465
-
What's new about cloud computing security
-
EECS Dept., Berkeley
-
Y.Chen, V.Paxson, and R.H.Katz, "What's new about Cloud Computing security", Tech. Report UCB/EECS-2010-5, EECS Dept., University of Califonia, Berkeley, 2010.
-
(2010)
Tech. Report UCB/EECS-2010-5, University of Califonia
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
|