-
2
-
-
84880057181
-
Cloud federations in contrail
-
E. Carlini, M. Coppola, P. Dazzi, L. Ricci, and G. Righetti, "Cloud Federations in Contrail", Proc. Euro-Par 2011: Parallel Processing Workshops, 2012, pp. 159-168
-
(2012)
Proc. Euro-Par 2011: Parallel Processing Workshops
, pp. 159-168
-
-
Carlini, E.1
Coppola, M.2
Dazzi, P.3
Ricci, L.4
Righetti, G.5
-
3
-
-
74049087607
-
The reservoir model and architecture for open federated cloud computing
-
July
-
B. Rochwerger et al., "The reservoir model and architecture for open federated cloud computing", IBM J. Res. Dev., Vol. 53, no. 4, July 2009, pp. 535-545
-
(2009)
IBM J. Res. Dev.
, vol.53
, Issue.4
, pp. 535-545
-
-
Rochwerger, B.1
-
4
-
-
84866605844
-
Cloud federation
-
September
-
T. Kurze, M. Klems, D. Bermbach, A. Lenk, S. Tai, and M. Kunze, "Cloud Federation", The Second International Conference on Cloud Computing, GRIDs, and Virtualization, September 2011, pp. 32-38
-
(2011)
The Second International Conference on Cloud Computing, GRIDs, and Virtualization
, pp. 32-38
-
-
Kurze, T.1
Klems, M.2
Bermbach, D.3
Lenk, A.4
Tai, S.5
Kunze, M.6
-
5
-
-
83255193441
-
Identity management directions in future internet
-
December
-
K. Lampropoulos and S. Denazis, "Identity management directions in future internet", IEEE Communications Magazine, Vol. 49, no. 12, December 2012, pp. 74-83
-
(2012)
IEEE Communications Magazine
, vol.49
, Issue.12
, pp. 74-83
-
-
Lampropoulos, K.1
Denazis, S.2
-
6
-
-
77957951132
-
How to enhance cloud architectures to enable cross-federation
-
July
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to Enhance Cloud Architectures to Enable Cross-Federation", Proc. 3rd IEEE International Conference on Cloud Computing, July 2010, pp.337345
-
(2010)
Proc. 3rd IEEE International Conference on Cloud Computing
, pp. 337345
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
7
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
June
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and Cloud Computing: InterCloud Identity Management Infrastructure", 19th IEEE WETICE, June 2010, pp. 263-265
-
(2010)
19th IEEE WETICE
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
8
-
-
77957924081
-
Three-phase cross-cloud federation model: The cloud SSO authentication
-
July
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication", 2nd AFIN, July 2010, pp. 94-101
-
(2010)
2nd AFIN
, pp. 94-101
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
9
-
-
84870579258
-
Federation establishment between CLEVER clouds through a SAML SSO authentication profile
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Federation Establishment Between CLEVER Clouds Through a SAML SSO Authentication Profile", International Journal on Advances in Internet Technology, Vol. 4, no. 12, 2011, pp. 14-27
-
(2011)
International Journal on Advances in Internet Technology
, vol.4
, Issue.12
, pp. 14-27
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
10
-
-
84911140061
-
The contrail approach to cloud federations
-
M. Coppola et al., "The Contrail approach to cloud federations", Proc. ISGC'12, 2012
-
(2012)
Proc. ISGC'12
-
-
Coppola, M.1
-
11
-
-
70349755377
-
Blueprint for the intercloud - Protocols and formats for cloud computing interoperability
-
May
-
D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, "Blueprint for the Intercloud - Protocols and Formats for Cloud Computing Interoperability", Proc. 4th ICIW, May 2009, pp. 328-336
-
(2009)
Proc. 4th ICIW
, pp. 328-336
-
-
Bernstein, D.1
Ludvigson, E.2
Sankar, K.3
Diamond, S.4
Morrow, M.5
-
12
-
-
78049350996
-
Intercloud directory and exchange protocol detail using XMPP and RDF
-
July
-
D. Bernstein and D. Vij, "Intercloud Directory and Exchange Protocol Detail Using XMPP and RDF", Proc. 6th SERVICES, July 2010, pp. 431-438
-
(2010)
Proc. 6th SERVICES
, pp. 431-438
-
-
Bernstein, D.1
Vij, D.2
-
13
-
-
84855407965
-
A survey on access control deployment
-
V. Suhendra, "A Survey on Access Control Deployment", Proc. FGIT-SecTech, 2011, pp. 11-20
-
(2011)
Proc. FGIT-SecTech
, pp. 11-20
-
-
Suhendra, V.1
-
14
-
-
84894114667
-
Toward quantified risk-adaptive access control for multi-tenant cloud computing
-
October
-
D. Fall, G. Blanc, T. Okuda, Y. Kadobayashi, and S. Yamaguchi, "Toward Quantified Risk-Adaptive Access Control for Multi-tenant Cloud Computing", Proc. 6th JWIS, October 2011
-
(2011)
Proc. 6th JWIS
-
-
Fall, D.1
Blanc, G.2
Okuda, T.3
Kadobayashi, Y.4
Yamaguchi, S.5
-
15
-
-
84867249207
-
A metric-based approach to assess risk for "On cloud"' federated identity management
-
P. Arias-Cabarcos, F. Almenárez-Mendoza, A. Marín- López, D. Díaz-Sánchez, and R. Sánchez-Guerrero, "A Metric-Based Approach to Assess Risk for "On Cloud"' Federated Identity Management", Journal of Network and Systems Management, Vol. 20, no. 4, 2012, pp. 513-533
-
(2012)
Journal of Network and Systems Management
, vol.20
, Issue.4
, pp. 513-533
-
-
Arias-Cabarcos, P.1
Almenárez-Mendoza, F.2
Marín-López, A.3
Díaz-Sánchez, D.4
Sánchez-Guerrero, R.5
-
16
-
-
80054066553
-
Contrail virtual execution platform challenges in being part of a cloud federation
-
P. Harsh, Y. Jegou, R. Cascella, and C. Morin, "Contrail virtual execution platform challenges in being part of a cloud federation", Proc. 4th ServiceWave, 2011, pp. 50-61
-
(2011)
Proc. 4th ServiceWave
, pp. 50-61
-
-
Harsh, P.1
Jegou, Y.2
Cascella, R.3
Morin, C.4
-
17
-
-
79956268427
-
InterCloud: Utility-oriented federation of cloud computing environments for scaling of application services
-
Springer
-
R. Buyya, R. Ranjan, and R. Calheiros, "InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services", Algorithms and Architectures for Parallel Processing, Vol. 6081, Springer, 2010, pp. 13-31
-
(2010)
Algorithms and Architectures for Parallel Processing
, vol.6081
, pp. 13-31
-
-
Buyya, R.1
Ranjan, R.2
Calheiros, R.3
-
19
-
-
84861303808
-
Challenges of operationalizing dynamic system access control: Transitioning from ABAC to RAdAC
-
March
-
B. Farroha and D. Farroha, "Challenges of operationalizing dynamic system access control: Transitioning from ABAC to RAdAC", Proc. SysCon, March 2012, pp. 1-7
-
(2012)
Proc. SysCon
, pp. 1-7
-
-
Farroha, B.1
Farroha, D.2
-
22
-
-
33845437573
-
Horizontal integration: Broader access models for realizing information dominance
-
JASON Program Office December
-
JASON Program Office, "Horizontal Integration: Broader Access Models for Realizing Information Dominance", Technical Report. MITRE Corporation, December 2004
-
(2004)
Technical Report. MITRE Corporation
-
-
-
24
-
-
79955991024
-
Quantified risk-adaptive access control for patient privacy protection in health information systems
-
Q. Wang and H. Jin, "Quantified risk-adaptive access control for patient privacy protection in health information systems", Proc. 6th ASIACCS, 2011, pp. 406-410
-
(2011)
Proc. 6th ASIACCS
, pp. 406-410
-
-
Wang, Q.1
Jin, H.2
-
25
-
-
60349122060
-
Using trust and risk in access control for grid environment
-
Y. Li, H. Sun, Z. Chen, J. Ren, and H. Luo, "Using Trust and Risk in Access Control for Grid Environment", Proc. SECTECH, 2008, pp. 13-16
-
(2008)
Proc. SECTECH
, pp. 13-16
-
-
Li, Y.1
Sun, H.2
Chen, Z.3
Ren, J.4
Luo, H.5
-
26
-
-
84861100364
-
Dynamic risk-based decision methods for access control systems
-
R. A. Shaikh, K. Adi, and L. Logrippo, "Dynamic risk-based decision methods for access control systems", Computers & Security, Elsevier, Vol. 31, no. 4, 2012, pp. 447-464
-
(2012)
Computers & Security, Elsevier
, vol.31
, Issue.4
, pp. 447-464
-
-
Shaikh, R.A.1
Adi, K.2
Logrippo, L.3
-
27
-
-
77950607501
-
Trading in risk: Using markets to improve access control
-
I. Molloy, P. Cheng, and P. Rohatgi, "Trading in risk: using markets to improve access control", Proc. NSPW, 2008, pp. 107-125
-
(2008)
Proc. NSPW
, pp. 107-125
-
-
Molloy, I.1
Cheng, P.2
Rohatgi, P.3
-
29
-
-
28744445458
-
Cardea: Dynamic access control in distributed systems
-
November
-
R. Lepro, "Cardea: Dynamic Access Control in Distributed Systems", Technical Report, NASA, November 2003
-
(2003)
Technical Report, NASA
-
-
Lepro, R.1
-
30
-
-
77649181757
-
How to securely break into RBAC: The BTG-RBAC model
-
A. Ferreira et al., "How to Securely Break into RBAC: The BTG-RBAC Model", Proc. ACSAC '09, 2009, pp. 23-31
-
(2009)
Proc. ACSAC '09
, pp. 23-31
-
-
Ferreira, A.1
-
31
-
-
33845414618
-
Toward information sharing: Benefit and risk access control (BARAC)
-
L. Zhang, A. Brodsky, and S. Jajodia, "Toward information sharing: benefit and risk access control (BARAC)", Proc. 7th IEEE POLICY, 2006, pp. 9-53
-
(2006)
Proc. 7th IEEE POLICY
, pp. 9-53
-
-
Zhang, L.1
Brodsky, A.2
Jajodia, S.3
-
32
-
-
70449506543
-
Criteria for evaluating the privacy protection level of identity management services
-
H. Lee, I. Jeun, and H. Jung, "Criteria for evaluating the privacy protection level of identity management services", Proc. SECURWARE, 2009, p. 155-160
-
(2009)
Proc. SECURWARE
, pp. 155-160
-
-
Lee, H.1
Jeun, I.2
Jung, H.3
-
33
-
-
84864570367
-
Context-aware authorization in highly dynamic environments
-
J. Tigli, S. Lavirotte, G. Rey, V. Hourdin, and M. Riveill, "Context-aware Authorization in Highly Dynamic Environments", International Journal of Computer Science Issues, Vol. 4, no. 1, 2009, pp. 24-35
-
(2009)
International Journal of Computer Science Issues
, vol.4
, Issue.1
, pp. 24-35
-
-
Tigli, J.1
Lavirotte, S.2
Rey, G.3
Hourdin, V.4
Riveill, M.5
|