메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1231-1238

Self-protecting documents for cloud storage security

Author keywords

autonomic document; cloud storage security; E DRM; self protecting document; usage control

Indexed keywords

AUTONOMIC DOCUMENT; E-DRM; SELF PROTECTING; STORAGE SECURITY; USAGE CONTROL;

EID: 84868131868     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.261     Document Type: Conference Paper
Times cited : (15)

References (25)
  • 6
    • 84859433005 scopus 로고    scopus 로고
    • A survey of risks, threats and vulnerabilities in cloud computing
    • K. Dahbur, B. Mohammad, and A. B. Tarakji, "A survey of risks , threats and vulnerabilities in cloud computing," Computing, pp. 1-6, 2011.
    • (2011) Computing , pp. 1-6
    • Dahbur, K.1    Mohammad, B.2    Tarakji, A.B.3
  • 7
    • 80053148753 scopus 로고    scopus 로고
    • Cloud computing security threats and responses
    • F. Sabahi, "Cloud computing security threats and responses," Computer Engineering, pp. 245-249, 2011.
    • (2011) Computer Engineering , pp. 245-249
    • Sabahi, F.1
  • 8
    • 79957623853 scopus 로고    scopus 로고
    • A multi-view approach for embedded information system security
    • IEEE
    • M. Munier, "A multi-view approach for embedded information system security," in CRiSIS. IEEE, 2010, pp. 65-72.
    • (2010) CRiSIS , pp. 65-72
    • Munier, M.1
  • 10
    • 77952406144 scopus 로고    scopus 로고
    • From contextual permission to dynamic pre-obligation: An integrated approach
    • IEEE Computer Society
    • Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia, "From contextual permission to dynamic pre-obligation: An integrated approach," in ARES. IEEE Computer Society, 2010, pp. 70-78.
    • (2010) ARES , pp. 70-78
    • Elrakaiby, Y.1    Cuppens, F.2    Cuppens-Boulahia, N.3
  • 11
    • 47649083260 scopus 로고    scopus 로고
    • Modeling contextual security policies
    • F. Cuppens and N. Cuppens-Boulahia, "Modeling contextual security policies," Int. J. Inf. Sec., vol. 7, no. 4, pp. 285-305, 2008.
    • (2008) Int. J. Inf. Sec. , vol.7 , Issue.4 , pp. 285-305
    • Cuppens, F.1    Cuppens-Boulahia, N.2
  • 12
    • 84944754330 scopus 로고    scopus 로고
    • Modelling contexts in the or-bac model
    • IEEE Computer Society
    • F. Cuppens and A. Miège, "Modelling contexts in the or-bac model," in ACSAC. IEEE Computer Society, 2003, pp. 416-427.
    • (2003) ACSAC , pp. 416-427
    • Cuppens, F.1    Miège, A.2
  • 14
    • 84944792110 scopus 로고    scopus 로고
    • Trbac: A temporal role-based access control model
    • E. Bertino, P. A. Bonatti, and E. Ferrari, "Trbac: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 191-233
    • Bertino, E.1    Bonatti, P.A.2    Ferrari, E.3
  • 16
    • 85066132860 scopus 로고    scopus 로고
    • A context-sensitive access control model and prototype implementation
    • SEC, ser. S. Qing and J. H. P. Eloff, Eds., Kluwer
    • D. G. Cholewka, R. A. Botha, and J. H. P. Eloff, "A context-sensitive access control model and prototype implementation," in SEC, ser. IFIP Conference Proceedings, S. Qing and J. H. P. Eloff, Eds., vol. 175. Kluwer, 2000, pp. 341-350.
    • (2000) IFIP Conference Proceedings , vol.175 , pp. 341-350
    • Cholewka, D.G.1    Botha, R.A.2    Eloff, J.H.P.3
  • 17
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 18
    • 78649826249 scopus 로고    scopus 로고
    • Assuring data trustworthiness - Concepts and research challenges
    • Secure Data Management, ser. W. Jonker and M. Petkovic, Eds., Springer
    • E. Bertino and H.-S. Lim, "Assuring data trustworthiness - concepts and research challenges," in Secure Data Management, ser. Lecture Notes in Computer Science, W. Jonker and M. Petkovic, Eds., vol. 6358. Springer, 2010, pp. 1-12.
    • (2010) Lecture Notes in Computer Science , vol.6358 , pp. 1-12
    • Bertino, E.1    Lim, H.-S.2
  • 19
    • 78049525147 scopus 로고    scopus 로고
    • Trust mechanisms for efficiency improvement in collaborative working environments
    • IEEE
    • Xingyu Zheng and Patrick Maillé and Cam Tu Phan Le and Stephane Morucci, "Trust mechanisms for efficiency improvement in collaborative working environments," in MASCOTS. IEEE, 2010, pp. 465-467.
    • (2010) MASCOTS , pp. 465-467
    • Zheng, X.1    Maillé, P.2    Le, C.T.P.3    Morucci, S.4
  • 21
    • 84855950958 scopus 로고    scopus 로고
    • Discoo, a really distributed system for cooperation
    • M. Munier, K. Benali, and C. Godart, "Discoo, a really distributed system for cooperation," Networking and Information Systems, vol. 2, no. 5-6, pp. 605-637, 1999.
    • (1999) Networking and Information Systems , vol.2 , Issue.5-6 , pp. 605-637
    • Munier, M.1    Benali, K.2    Godart, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.