-
1
-
-
79961140739
-
Ensure data security in cloud storage
-
X. Zhang, H.-t. Du, J.-q. Chen, Y. Lin, and L.-j. Zeng, "Ensure data security in cloud storage," 2011 International Conference on Network Computing and Information Security, pp. 284-287, 2011.
-
(2011)
2011 International Conference on Network Computing and Information Security
, pp. 284-287
-
-
Zhang, X.1
Du, H.-T.2
Chen, J.-Q.3
Lin, Y.4
Zeng, L.-J.5
-
2
-
-
79960241719
-
A business model for cloud computing based on a separate encryption and decryption service
-
vol. 0
-
J.-J. Hwang, H.-K. Chuang, Y.-C. Hsu, and C.-H. Wu, "A business model for cloud computing based on a separate encryption and decryption service," Information Science and Applications, International Conference on, vol. 0, pp. 1-7, 2011.
-
(2011)
Information Science and Applications, International Conference on
, pp. 1-7
-
-
Hwang, J.-J.1
Chuang, H.-K.2
Hsu, Y.-C.3
Wu, C.-H.4
-
3
-
-
77949842100
-
-
M. Loukides, Ed. O'Reilly
-
T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy, M. Loukides, Ed. O'Reilly, 2009, vol. 1, no. 11.
-
(2009)
Cloud Security and Privacy
, vol.1
, Issue.11
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
4
-
-
77958450169
-
Cloud storage as the infrastructure of cloud computing
-
J. Wu, L. Ping, X. Ge, Y. Wang, and J. Fu, "Cloud storage as the infrastructure of cloud computing," 2010 International Conference on Intelligent Computing and Cognitive Informatics, pp. 380-383, 2010.
-
(2010)
2010 International Conference on Intelligent Computing and Cognitive Informatics
, pp. 380-383
-
-
Wu, J.1
Ping, L.2
Ge, X.3
Wang, Y.4
Fu, J.5
-
5
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security Privacy Magazine, vol. 9, no. 2, pp. 50-57, 2011.
-
(2011)
IEEE Security Privacy Magazine
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
6
-
-
84859433005
-
A survey of risks, threats and vulnerabilities in cloud computing
-
K. Dahbur, B. Mohammad, and A. B. Tarakji, "A survey of risks , threats and vulnerabilities in cloud computing," Computing, pp. 1-6, 2011.
-
(2011)
Computing
, pp. 1-6
-
-
Dahbur, K.1
Mohammad, B.2
Tarakji, A.B.3
-
7
-
-
80053148753
-
Cloud computing security threats and responses
-
F. Sabahi, "Cloud computing security threats and responses," Computer Engineering, pp. 245-249, 2011.
-
(2011)
Computer Engineering
, pp. 245-249
-
-
Sabahi, F.1
-
8
-
-
79957623853
-
A multi-view approach for embedded information system security
-
IEEE
-
M. Munier, "A multi-view approach for embedded information system security," in CRiSIS. IEEE, 2010, pp. 65-72.
-
(2010)
CRiSIS
, pp. 65-72
-
-
Munier, M.1
-
9
-
-
77952407814
-
Organization based access control
-
IEEE Computer Society
-
A. A. E. Kalam, S. Benferhat, A. Miège, R. E. Baida, F. Cuppens, C. Saurel, P. Balbiani, Y. Deswarte, and G. Trouessin, "Organization based access control," in POLICY. IEEE Computer Society, 2003, pp. 120-131.
-
(2003)
POLICY
, pp. 120-131
-
-
Kalam, A.A.E.1
Benferhat, S.2
Miège, A.3
Baida, R.E.4
Cuppens, F.5
Saurel, C.6
Balbiani, P.7
Deswarte, Y.8
Trouessin, G.9
-
10
-
-
77952406144
-
From contextual permission to dynamic pre-obligation: An integrated approach
-
IEEE Computer Society
-
Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia, "From contextual permission to dynamic pre-obligation: An integrated approach," in ARES. IEEE Computer Society, 2010, pp. 70-78.
-
(2010)
ARES
, pp. 70-78
-
-
Elrakaiby, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
11
-
-
47649083260
-
Modeling contextual security policies
-
F. Cuppens and N. Cuppens-Boulahia, "Modeling contextual security policies," Int. J. Inf. Sec., vol. 7, no. 4, pp. 285-305, 2008.
-
(2008)
Int. J. Inf. Sec.
, vol.7
, Issue.4
, pp. 285-305
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
-
12
-
-
84944754330
-
Modelling contexts in the or-bac model
-
IEEE Computer Society
-
F. Cuppens and A. Miège, "Modelling contexts in the or-bac model," in ACSAC. IEEE Computer Society, 2003, pp. 416-427.
-
(2003)
ACSAC
, pp. 416-427
-
-
Cuppens, F.1
Miège, A.2
-
13
-
-
33847092871
-
Georbac: A spatially aware rbac
-
M. L. Damiani, E. Bertino, B. Catania, and P. Perlasca, "Georbac: A spatially aware rbac," ACM Trans. Inf. Syst. Secur., vol. 10, no. 1, 2007.
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.1
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
14
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari, "Trbac: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
15
-
-
0035790754
-
Flexible team-based access control using contexts
-
C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, "Flexible team-based access control using contexts," in SACMAT, 2001, pp. 21-27.
-
(2001)
SACMAT
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
16
-
-
85066132860
-
A context-sensitive access control model and prototype implementation
-
SEC, ser. S. Qing and J. H. P. Eloff, Eds., Kluwer
-
D. G. Cholewka, R. A. Botha, and J. H. P. Eloff, "A context-sensitive access control model and prototype implementation," in SEC, ser. IFIP Conference Proceedings, S. Qing and J. H. P. Eloff, Eds., vol. 175. Kluwer, 2000, pp. 341-350.
-
(2000)
IFIP Conference Proceedings
, vol.175
, pp. 341-350
-
-
Cholewka, D.G.1
Botha, R.A.2
Eloff, J.H.P.3
-
17
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
18
-
-
78649826249
-
Assuring data trustworthiness - Concepts and research challenges
-
Secure Data Management, ser. W. Jonker and M. Petkovic, Eds., Springer
-
E. Bertino and H.-S. Lim, "Assuring data trustworthiness - concepts and research challenges," in Secure Data Management, ser. Lecture Notes in Computer Science, W. Jonker and M. Petkovic, Eds., vol. 6358. Springer, 2010, pp. 1-12.
-
(2010)
Lecture Notes in Computer Science
, vol.6358
, pp. 1-12
-
-
Bertino, E.1
Lim, H.-S.2
-
19
-
-
78049525147
-
Trust mechanisms for efficiency improvement in collaborative working environments
-
IEEE
-
Xingyu Zheng and Patrick Maillé and Cam Tu Phan Le and Stephane Morucci, "Trust mechanisms for efficiency improvement in collaborative working environments," in MASCOTS. IEEE, 2010, pp. 465-467.
-
(2010)
MASCOTS
, pp. 465-467
-
-
Zheng, X.1
Maillé, P.2
Le, C.T.P.3
Morucci, S.4
-
20
-
-
84871550480
-
Evaluating the trustworthiness of contributors in a collaborative environment
-
CollaborateCom, ser. E. Bertino and J. B. D. Joshi, Eds., Springer
-
C. T. P. Le, F. Cuppens, N. Cuppens-Boulahia, and P. Maillé, "Evaluating the trustworthiness of contributors in a collaborative environment," in CollaborateCom, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, E. Bertino and J. B. D. Joshi, Eds., vol. 10. Springer, 2008, pp. 451-460.
-
(2008)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.10
, pp. 451-460
-
-
Le, C.T.P.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Maillé, P.4
-
21
-
-
84855950958
-
Discoo, a really distributed system for cooperation
-
M. Munier, K. Benali, and C. Godart, "Discoo, a really distributed system for cooperation," Networking and Information Systems, vol. 2, no. 5-6, pp. 605-637, 1999.
-
(1999)
Networking and Information Systems
, vol.2
, Issue.5-6
, pp. 605-637
-
-
Munier, M.1
Benali, K.2
Godart, C.3
-
23
-
-
33645967666
-
-
ISO/IEC, International Organization for Standardization, Geneva, Switzerland, Published
-
ISO/IEC, "ISO/IEC 27005:2011: Information technology - security techniques - information security risk management," International Organization for Standardization, Geneva, Switzerland, Published, 2011.
-
(2011)
ISO/IEC 27005:2011: Information Technology - Security Techniques - Information Security Risk Management
-
-
-
24
-
-
77953082000
-
A delegation model for extended rbac
-
M. Ben-Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, and A. Bouhoula, "A delegation model for extended rbac," Int. J. Inf. Sec., vol. 9, no. 3, pp. 209-236, 2010.
-
(2010)
Int. J. Inf. Sec.
, vol.9
, Issue.3
, pp. 209-236
-
-
Ben-Ghorbel-Talbi, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
-
25
-
-
84855977302
-
Environmental constraints management in digital right licences
-
Publibook, Ed. 75015 Paris: RSM - Dépt. Réseaux, Sécurité et Multimédia (Institut TELECOM ; TELECOM Bretagne)
-
J. Thomas, F. Cuppens, and N. Cuppens, "Environmental constraints management in digital right licences," in SARSSI 2008 : 3ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, 13-17 octobre, Loctudy, France, Publibook, Ed. 75015 Paris: RSM - Dépt. Réseaux, Sécurité et Multimédia (Institut TELECOM ; TELECOM Bretagne), 2008, pp. 85-99.
-
(2008)
SARSSI 2008: 3ème Conférence Sur la Sécurité des Architectures Réseaux et des Systèmes D'Information, 13-17 Octobre, Loctudy, France
, pp. 85-99
-
-
Thomas, J.1
Cuppens, F.2
Cuppens, N.3
|