메뉴 건너뛰기




Volumn , Issue , 2013, Pages 8-13

Risk-based dynamic access control for a highly scalable cloud federation

Author keywords

Access control; Cloud computing; Cloud federation; Risk

Indexed keywords


EID: 84894170461     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (33)
  • 3
    • 74049087607 scopus 로고    scopus 로고
    • The reservoir model and architecture for open federated cloud computing
    • July
    • B. Rochwerger et al., "The reservoir model and architecture for open federated cloud computing", IBM J. Res. Dev., Vol. 53, no. 4, July 2009, pp. 535-545
    • (2009) IBM J. Res. Dev. , vol.53 , Issue.4 , pp. 535-545
    • Rochwerger, B.1
  • 5
    • 83255193441 scopus 로고    scopus 로고
    • Identity management directions in future internet
    • December
    • K. Lampropoulos and S. Denazis, "Identity management directions in future internet", IEEE Communications Magazine, Vol. 49, no. 12, December 2012, pp. 74-83
    • (2012) IEEE Communications Magazine , vol.49 , Issue.12 , pp. 74-83
    • Lampropoulos, K.1    Denazis, S.2
  • 7
    • 77955905901 scopus 로고    scopus 로고
    • Security and cloud computing: Intercloud identity management infrastructure
    • June
    • A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and Cloud Computing: InterCloud Identity Management Infrastructure", 19th IEEE WETICE, June 2010, pp. 263-265
    • (2010) 19th IEEE WETICE , pp. 263-265
    • Celesti, A.1    Tusa, F.2    Villari, M.3    Puliafito, A.4
  • 8
    • 77957924081 scopus 로고    scopus 로고
    • Three-phase cross-cloud federation model: The cloud SSO authentication
    • July
    • A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication", 2nd AFIN, July 2010, pp. 94-101
    • (2010) 2nd AFIN , pp. 94-101
    • Celesti, A.1    Tusa, F.2    Villari, M.3    Puliafito, A.4
  • 10
    • 84911140061 scopus 로고    scopus 로고
    • The contrail approach to cloud federations
    • M. Coppola et al., "The Contrail approach to cloud federations", Proc. ISGC'12, 2012
    • (2012) Proc. ISGC'12
    • Coppola, M.1
  • 11
    • 70349755377 scopus 로고    scopus 로고
    • Blueprint for the intercloud - Protocols and formats for cloud computing interoperability
    • May
    • D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, "Blueprint for the Intercloud - Protocols and Formats for Cloud Computing Interoperability", Proc. 4th ICIW, May 2009, pp. 328-336
    • (2009) Proc. 4th ICIW , pp. 328-336
    • Bernstein, D.1    Ludvigson, E.2    Sankar, K.3    Diamond, S.4    Morrow, M.5
  • 12
    • 78049350996 scopus 로고    scopus 로고
    • Intercloud directory and exchange protocol detail using XMPP and RDF
    • July
    • D. Bernstein and D. Vij, "Intercloud Directory and Exchange Protocol Detail Using XMPP and RDF", Proc. 6th SERVICES, July 2010, pp. 431-438
    • (2010) Proc. 6th SERVICES , pp. 431-438
    • Bernstein, D.1    Vij, D.2
  • 13
    • 84855407965 scopus 로고    scopus 로고
    • A survey on access control deployment
    • V. Suhendra, "A Survey on Access Control Deployment", Proc. FGIT-SecTech, 2011, pp. 11-20
    • (2011) Proc. FGIT-SecTech , pp. 11-20
    • Suhendra, V.1
  • 14
    • 84894114667 scopus 로고    scopus 로고
    • Toward quantified risk-adaptive access control for multi-tenant cloud computing
    • October
    • D. Fall, G. Blanc, T. Okuda, Y. Kadobayashi, and S. Yamaguchi, "Toward Quantified Risk-Adaptive Access Control for Multi-tenant Cloud Computing", Proc. 6th JWIS, October 2011
    • (2011) Proc. 6th JWIS
    • Fall, D.1    Blanc, G.2    Okuda, T.3    Kadobayashi, Y.4    Yamaguchi, S.5
  • 16
    • 80054066553 scopus 로고    scopus 로고
    • Contrail virtual execution platform challenges in being part of a cloud federation
    • P. Harsh, Y. Jegou, R. Cascella, and C. Morin, "Contrail virtual execution platform challenges in being part of a cloud federation", Proc. 4th ServiceWave, 2011, pp. 50-61
    • (2011) Proc. 4th ServiceWave , pp. 50-61
    • Harsh, P.1    Jegou, Y.2    Cascella, R.3    Morin, C.4
  • 17
    • 79956268427 scopus 로고    scopus 로고
    • InterCloud: Utility-oriented federation of cloud computing environments for scaling of application services
    • Springer
    • R. Buyya, R. Ranjan, and R. Calheiros, "InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services", Algorithms and Architectures for Parallel Processing, Vol. 6081, Springer, 2010, pp. 13-31
    • (2010) Algorithms and Architectures for Parallel Processing , vol.6081 , pp. 13-31
    • Buyya, R.1    Ranjan, R.2    Calheiros, R.3
  • 19
    • 84861303808 scopus 로고    scopus 로고
    • Challenges of operationalizing dynamic system access control: Transitioning from ABAC to RAdAC
    • March
    • B. Farroha and D. Farroha, "Challenges of operationalizing dynamic system access control: Transitioning from ABAC to RAdAC", Proc. SysCon, March 2012, pp. 1-7
    • (2012) Proc. SysCon , pp. 1-7
    • Farroha, B.1    Farroha, D.2
  • 22
    • 33845437573 scopus 로고    scopus 로고
    • Horizontal integration: Broader access models for realizing information dominance
    • JASON Program Office December
    • JASON Program Office, "Horizontal Integration: Broader Access Models for Realizing Information Dominance", Technical Report. MITRE Corporation, December 2004
    • (2004) Technical Report. MITRE Corporation
  • 24
    • 79955991024 scopus 로고    scopus 로고
    • Quantified risk-adaptive access control for patient privacy protection in health information systems
    • Q. Wang and H. Jin, "Quantified risk-adaptive access control for patient privacy protection in health information systems", Proc. 6th ASIACCS, 2011, pp. 406-410
    • (2011) Proc. 6th ASIACCS , pp. 406-410
    • Wang, Q.1    Jin, H.2
  • 25
    • 60349122060 scopus 로고    scopus 로고
    • Using trust and risk in access control for grid environment
    • Y. Li, H. Sun, Z. Chen, J. Ren, and H. Luo, "Using Trust and Risk in Access Control for Grid Environment", Proc. SECTECH, 2008, pp. 13-16
    • (2008) Proc. SECTECH , pp. 13-16
    • Li, Y.1    Sun, H.2    Chen, Z.3    Ren, J.4    Luo, H.5
  • 26
    • 84861100364 scopus 로고    scopus 로고
    • Dynamic risk-based decision methods for access control systems
    • R. A. Shaikh, K. Adi, and L. Logrippo, "Dynamic risk-based decision methods for access control systems", Computers & Security, Elsevier, Vol. 31, no. 4, 2012, pp. 447-464
    • (2012) Computers & Security, Elsevier , vol.31 , Issue.4 , pp. 447-464
    • Shaikh, R.A.1    Adi, K.2    Logrippo, L.3
  • 27
    • 77950607501 scopus 로고    scopus 로고
    • Trading in risk: Using markets to improve access control
    • I. Molloy, P. Cheng, and P. Rohatgi, "Trading in risk: using markets to improve access control", Proc. NSPW, 2008, pp. 107-125
    • (2008) Proc. NSPW , pp. 107-125
    • Molloy, I.1    Cheng, P.2    Rohatgi, P.3
  • 29
    • 28744445458 scopus 로고    scopus 로고
    • Cardea: Dynamic access control in distributed systems
    • November
    • R. Lepro, "Cardea: Dynamic Access Control in Distributed Systems", Technical Report, NASA, November 2003
    • (2003) Technical Report, NASA
    • Lepro, R.1
  • 30
    • 77649181757 scopus 로고    scopus 로고
    • How to securely break into RBAC: The BTG-RBAC model
    • A. Ferreira et al., "How to Securely Break into RBAC: The BTG-RBAC Model", Proc. ACSAC '09, 2009, pp. 23-31
    • (2009) Proc. ACSAC '09 , pp. 23-31
    • Ferreira, A.1
  • 31
    • 33845414618 scopus 로고    scopus 로고
    • Toward information sharing: Benefit and risk access control (BARAC)
    • L. Zhang, A. Brodsky, and S. Jajodia, "Toward information sharing: benefit and risk access control (BARAC)", Proc. 7th IEEE POLICY, 2006, pp. 9-53
    • (2006) Proc. 7th IEEE POLICY , pp. 9-53
    • Zhang, L.1    Brodsky, A.2    Jajodia, S.3
  • 32
    • 70449506543 scopus 로고    scopus 로고
    • Criteria for evaluating the privacy protection level of identity management services
    • H. Lee, I. Jeun, and H. Jung, "Criteria for evaluating the privacy protection level of identity management services", Proc. SECURWARE, 2009, p. 155-160
    • (2009) Proc. SECURWARE , pp. 155-160
    • Lee, H.1    Jeun, I.2    Jung, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.