-
1
-
-
78650059341
-
Toward a multi-tenancy authorization system for cloud services
-
Alcaraz Calero, J., Edwards, N., Kirschnick, J., Wilcock, L., Wray, M.: Toward a multi-tenancy authorization system for cloud services. IEEE Secur. Priv. 8(6), 48-55 (2010).
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 48-55
-
-
Alcaraz Calero, J.1
Edwards, N.2
Kirschnick, J.3
Wilcock, L.4
Wray, M.5
-
5
-
-
79956318862
-
Enforcing end-to-end application security in the cloud (big ideas paper)
-
Springer, Berlin
-
Bacon, J., Evans, D., Eyers, D. M., Migliavacca, M., Pietzuch, P., Shand, B.: Enforcing end-to-end application security in the cloud (big ideas paper). In: Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, pp. 293-312. Springer, Berlin (2010).
-
(2010)
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
, pp. 293-312
-
-
Bacon, J.1
Evans, D.2
Eyers, D.M.3
Migliavacca, M.4
Pietzuch, P.5
Shand, B.6
-
7
-
-
42549172448
-
-
Boost
-
Boost. Boost c++ libraries, http://www. boost. org/, 2011.
-
(2011)
Boost c++ libraries
-
-
-
9
-
-
78649314206
-
Authorization and access control
-
In: Petkovic, M., Jonker, W. (eds.), Springer, Berlin
-
Capitani di Vimercati, S., Foresti, S., Samarati, P.: Authorization and access control. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern Data Management, Data-Centric Systems and Applications, pp. 39-53. Springer, Berlin (2007).
-
(2007)
Security, Privacy, and Trust in Modern Data Management, Data-Centric Systems and Applications
, pp. 39-53
-
-
Capitani di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
12
-
-
0141911037
-
Role-Based Access Control
-
Ferraiolo, D. F., Kuhn, D. R., Chandramouli, R.: Role-Based Access Control. Artech House, Inc., (2003).
-
(2003)
Artech House, Inc
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
13
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
ACM, New York
-
Fisler, K., Krishnamurthi, S., Meyerovich, L. A., Tschantz, M. C.: Verification and change-impact analysis of access-control policies. In: Proceedings of the 27th International Conference on Software Engineering, ICSE '05, pp. 196-205. ACM, New York (2005).
-
(2005)
Proceedings of the 27th International Conference on Software Engineering, ICSE '05
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
14
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
Foster, I., Yong, Z., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, 2008. GCE '08, pp. 1-10, (2008).
-
(2008)
Grid Computing Environments Workshop, 2008. GCE '08
, pp. 1-10
-
-
Foster, I.1
Yong, Z.2
Raicu, I.3
Lu, S.4
-
16
-
-
84861095268
-
domRBAC: An access control model for modern collaborative systems
-
Gouglidis, A., Mavridis, I.: domRBAC: An access control model for modern collaborative systems. Comput. Secur. 31(4), 540-556 (2012).
-
(2012)
Comput. Secur.
, vol.31
, Issue.4
, pp. 540-556
-
-
Gouglidis, A.1
Mavridis, I.2
-
17
-
-
24644445703
-
Conformance checking of RBAC policy and its implementation
-
In: Deng, R., Bao, F., Pang, H., Zhou, J. (eds.), Springer, Berlin
-
Hansen, F., Oleshchuk, V.: Conformance checking of RBAC policy and its implementation. In: Deng, R., Bao, F., Pang, H., Zhou, J. (eds.) Information Security Practice and Experience, volume 3439 of Lecture Notes in Computer Science, pp. 144-155. Springer, Berlin (2005).
-
(2005)
Information Security Practice and Experience, volume 3439 of Lecture Notes in Computer Science
, pp. 144-155
-
-
Hansen, F.1
Oleshchuk, V.2
-
18
-
-
57349119890
-
Enabling verification and conformance testing for access control model
-
ACM, New York
-
Hu, H., Ahn, G.: Enabling verification and conformance testing for access control model. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT '08, pp. 195-204. ACM, New York (2008).
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT '08
, pp. 195-204
-
-
Hu, H.1
Ahn, G.2
-
19
-
-
63149102166
-
Property verification for generic access control models
-
EUC '08, IEEE Computer Society, Washington
-
Hu, V. C., Kuhn, D. R., Xie, T.: Property verification for generic access control models. In: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 02, EUC '08, pp. 243-250. IEEE Computer Society, Washington, DC (2008).
-
(2008)
Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
, vol.2
, pp. 243-250
-
-
Hu, V.C.1
Kuhn, D.R.2
Xie, T.3
-
20
-
-
79960042343
-
Model checking for verification of mandatory access control models and properties
-
Hu, V. C., Kuhn, D. R., Xie, T., Hwang, J.: Model checking for verification of mandatory access control models and properties. Int. J. Softw. Eng. Knowl. Eng. 21(1), 103-127 (2011).
-
(2011)
Int. J. Softw. Eng. Knowl. Eng.
, vol.21
, Issue.1
, pp. 103-127
-
-
Hu, V.C.1
Kuhn, D.R.2
Xie, T.3
Hwang, J.4
-
21
-
-
55549143296
-
Automated verification of access control policies using a SAT solver
-
Hughes, G., Bultan, T.: Automated verification of access control policies using a SAT solver. Int. J. Softw. Tools Technol. Transf. 10(6), 503-520 (2008).
-
(2008)
Int. J. Softw. Tools Technol. Transf.
, vol.10
, Issue.6
, pp. 503-520
-
-
Hughes, G.1
Bultan, T.2
-
22
-
-
79951875048
-
ACPT: a tool for modeling and verifying access control policies
-
IEEE Computer Society, Washington, DC
-
Hwang, J., Xie, T., Hu, V., Altunay, M.: ACPT: a tool for modeling and verifying access control policies. In: Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY '10, pp. 40-43. IEEE Computer Society, Washington, DC (2010).
-
(2010)
Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY '10
, pp. 40-43
-
-
Hwang, J.1
Xie, T.2
Hu, V.3
Altunay, M.4
-
23
-
-
80755168364
-
Automatic error finding in access-control policies
-
ACM, New York
-
Jayaraman, K., Ganesh, V., Tripunitara, M., Rinard, M., Chapin, S.: Automatic error finding in access-control policies. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, pp. 163-174. ACM, New York (2011).
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 163-174
-
-
Jayaraman, K.1
Ganesh, V.2
Tripunitara, M.3
Rinard, M.4
Chapin, S.5
-
24
-
-
84897061873
-
-
JeeHyun, H., Mine, A., Tao, X., Vincent, H. Model Checking Grid Policies. https://sites. google. com/site/gridpolicyproject/home.
-
Model Checking Grid Policies
-
-
JeeHyun, H.1
Mine, A.2
Tao, X.3
Vincent, H.4
-
25
-
-
55949085989
-
Towards formal verification of role-based access control policies
-
Jha, S., Li, N., Tripunitara, M., Wang, Q., Winsborough, W.: Towards formal verification of role-based access control policies. IEEE Trans. Dependable Secur. Comput. 5, 242-255 (2008).
-
(2008)
IEEE Trans. Dependable Secur. Comput.
, vol.5
, pp. 242-255
-
-
Jha, S.1
Li, N.2
Tripunitara, M.3
Wang, Q.4
Winsborough, W.5
-
26
-
-
41349105078
-
Network growth by copying
-
Krapivsky, P., Redner, S.: Network growth by copying. Phys. Rev. E 71(3), 036118 (2005).
-
(2005)
Phys. Rev. E
, vol.71
, Issue.3
, pp. 036118
-
-
Krapivsky, P.1
Redner, S.2
-
29
-
-
84864074043
-
A refined rbac model for cloud computing
-
Li, W., Wan, H., Ren, X., Li. S.: A refined rbac model for cloud computing. In: Computer and Information Science (ICIS), 2012 IEEE/ACIS 11th International Conference on, pp. 43-48, (2012).
-
(2012)
Computer and Information Science (ICIS), 2012 IEEE/ACIS 11th International Conference
, pp. 43-48
-
-
Li, W.1
Wan, H.2
Ren, X.3
Li, S.4
-
30
-
-
37249020924
-
A critique of the ANSI standard on role-based access control
-
Li, N., Byun, J.-W., Bertino, E.: A critique of the ANSI standard on role-based access control. IEEE Secur. Priv. 5(6), 41-49 (2007).
-
(2007)
IEEE Secur. Priv.
, vol.5
, Issue.6
, pp. 41-49
-
-
Li, N.1
Byun, J.-W.2
Bertino, E.3
-
32
-
-
84897044018
-
-
Microsoft
-
Microsoft. Windows azure security guidance, http://www. windowsazure. com/en-us/develop/net/best-practices/security/, (2013).
-
(2013)
Windows azure security guidance
-
-
-
33
-
-
79956292393
-
Distributed middleware enforcement of event flow security policy
-
Springer, Berlin
-
Migliavacca, M., Papagiannis, I., Eyers, D. M., Shand, B., Bacon, J., Pietzuch, P.: Distributed middleware enforcement of event flow security policy. In: Middleware 2010, pp. 334-354. Springer, Berlin (2010).
-
(2010)
Middleware 2010
, pp. 334-354
-
-
Migliavacca, M.1
Papagiannis, I.2
Eyers, D.M.3
Shand, B.4
Bacon, J.5
Pietzuch, P.6
-
34
-
-
84897082234
-
-
NASA. Nebula's implementation of role based access control (RBAC)
-
NASA. Nebula's implementation of role based access control (RBAC), http://nebula. nasa. gov/blog/2010/06/03/nebulas-implementation-role-based-access-control-rbac/, (2010).
-
(2010)
-
-
-
35
-
-
84897082660
-
-
NetworkX. Networkx
-
NetworkX. Networkx, http://networkx. lanl. gov/, (2012).
-
(2012)
-
-
-
41
-
-
84897052282
-
-
OpenStack
-
OpenStack. Managing compute users, http://docs. openstack. org/diablo/openstack-compute/admin/content/managing-compute-users. html, (2013).
-
(2013)
Managing compute users
-
-
-
42
-
-
84897056250
-
-
OpenStack, Users and projects
-
OpenStack. Users and projects, http://docs. openstack. org/diablo/openstack-compute/admin/content/users-and-projects. html (2013).
-
(2013)
-
-
-
44
-
-
80455162693
-
Conformance checking of dynamic access control policies
-
Springer, Berlin
-
Power, D., Slaymaker, M., Simpson, A.: Conformance checking of dynamic access control policies. In: Formal Methods and Software Engineering, pp. 227-242. Springer, Berlin (2011).
-
(2011)
Formal Methods and Software Engineering
, pp. 227-242
-
-
Power, D.1
Slaymaker, M.2
Simpson, A.3
-
45
-
-
0348001131
-
A transitive closure algorithm
-
doi:10.1007/BF01940892
-
Purdom, P.: A transitive closure algorithm. BIT Numer. Math. 10, 76-94 (1970). doi: 10. 1007/BF01940892.
-
(1970)
BIT Numer. Math.
, vol.10
, pp. 76-94
-
-
Purdom, P.1
-
46
-
-
0028513932
-
Access control: principles and practice
-
Sandhu, R. S., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32, 40-48 (1994).
-
(1994)
IEEE Commun. Mag.
, vol.32
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
47
-
-
0030086382
-
Role-based access control models
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E.: Role-based access control models. IEEE Comput. 29(2), 38-47 (1996).
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
48
-
-
0001549660
-
The arbac97 model for role-based administration of roles
-
Sandhu, R., Bhamidipati, V., Munawer, Q.: The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 2(1), 105-135 (1999).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
50
-
-
0035790675
-
The role-based access control system of a european bank: a case study and discussion
-
ACM
-
Schaad, A., Moffett, J., Jacob, J.: The role-based access control system of a european bank: a case study and discussion. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, pp. 3-9. ACM (2001).
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
51
-
-
28244460211
-
Secure interoperation in a multidomain environment employing RBAC policies
-
Shafiq, B., Joshi, J. B. D., Bertino, E., Ghafoor, A.: Secure interoperation in a multidomain environment employing RBAC policies. IEEE Trans. Knowl. Data Eng. 17(11), 1557 (2005).
-
(2005)
IEEE Trans. Knowl. Data Eng.
, vol.17
, Issue.11
, pp. 1557
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
53
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., Joshi, J. B., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. & Priv. 8(6), 24-31 (2010).
-
(2010)
IEEE Secur. & Priv.
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.2
Ahn, G.-J.3
-
54
-
-
84861108460
-
A new rbac based access control model for cloud computing
-
In: Li, R., Cao, J., Bourgeois, J. (eds.), Springer, Berlin
-
Tang, Z., Wei, J., Sallam, A., Li, K., Li, R.: A new rbac based access control model for cloud computing. In: Li, R., Cao, J., Bourgeois, J. (eds.) Advances in Grid and Pervasive Computing, volume 7296 of Lecture Notes in Computer Science, pp. 279-288. Springer, Berlin (2012).
-
(2012)
Advances in Grid and Pervasive Computing, volume 7296 of Lecture Notes in Computer Science
, pp. 279-288
-
-
Tang, Z.1
Wei, J.2
Sallam, A.3
Li, K.4
Li, R.5
|