메뉴 건너뛰기




Volumn 13, Issue 2, 2014, Pages 97-111

Security policy verification for multi-domains in cloud systems

Author keywords

Cloud computing; Collaboration; Multi domain; RBAC; Secure inter operation; Verification

Indexed keywords

CLOUD COMPUTING; ELASTICITY; MODEL CHECKING; VERIFICATION;

EID: 84897101278     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-013-0205-x     Document Type: Article
Times cited : (42)

References (54)
  • 7
    • 42549172448 scopus 로고    scopus 로고
    • Boost
    • Boost. Boost c++ libraries, http://www. boost. org/, 2011.
    • (2011) Boost c++ libraries
  • 16
    • 84861095268 scopus 로고    scopus 로고
    • domRBAC: An access control model for modern collaborative systems
    • Gouglidis, A., Mavridis, I.: domRBAC: An access control model for modern collaborative systems. Comput. Secur. 31(4), 540-556 (2012).
    • (2012) Comput. Secur. , vol.31 , Issue.4 , pp. 540-556
    • Gouglidis, A.1    Mavridis, I.2
  • 20
    • 79960042343 scopus 로고    scopus 로고
    • Model checking for verification of mandatory access control models and properties
    • Hu, V. C., Kuhn, D. R., Xie, T., Hwang, J.: Model checking for verification of mandatory access control models and properties. Int. J. Softw. Eng. Knowl. Eng. 21(1), 103-127 (2011).
    • (2011) Int. J. Softw. Eng. Knowl. Eng. , vol.21 , Issue.1 , pp. 103-127
    • Hu, V.C.1    Kuhn, D.R.2    Xie, T.3    Hwang, J.4
  • 21
    • 55549143296 scopus 로고    scopus 로고
    • Automated verification of access control policies using a SAT solver
    • Hughes, G., Bultan, T.: Automated verification of access control policies using a SAT solver. Int. J. Softw. Tools Technol. Transf. 10(6), 503-520 (2008).
    • (2008) Int. J. Softw. Tools Technol. Transf. , vol.10 , Issue.6 , pp. 503-520
    • Hughes, G.1    Bultan, T.2
  • 26
    • 41349105078 scopus 로고    scopus 로고
    • Network growth by copying
    • Krapivsky, P., Redner, S.: Network growth by copying. Phys. Rev. E 71(3), 036118 (2005).
    • (2005) Phys. Rev. E , vol.71 , Issue.3 , pp. 036118
    • Krapivsky, P.1    Redner, S.2
  • 30
    • 37249020924 scopus 로고    scopus 로고
    • A critique of the ANSI standard on role-based access control
    • Li, N., Byun, J.-W., Bertino, E.: A critique of the ANSI standard on role-based access control. IEEE Secur. Priv. 5(6), 41-49 (2007).
    • (2007) IEEE Secur. Priv. , vol.5 , Issue.6 , pp. 41-49
    • Li, N.1    Byun, J.-W.2    Bertino, E.3
  • 32
    • 84897044018 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft. Windows azure security guidance, http://www. windowsazure. com/en-us/develop/net/best-practices/security/, (2013).
    • (2013) Windows azure security guidance
  • 34
    • 84897082234 scopus 로고    scopus 로고
    • NASA. Nebula's implementation of role based access control (RBAC)
    • NASA. Nebula's implementation of role based access control (RBAC), http://nebula. nasa. gov/blog/2010/06/03/nebulas-implementation-role-based-access-control-rbac/, (2010).
    • (2010)
  • 35
    • 84897082660 scopus 로고    scopus 로고
    • NetworkX. Networkx
    • NetworkX. Networkx, http://networkx. lanl. gov/, (2012).
    • (2012)
  • 41
    • 84897052282 scopus 로고    scopus 로고
    • OpenStack
    • OpenStack. Managing compute users, http://docs. openstack. org/diablo/openstack-compute/admin/content/managing-compute-users. html, (2013).
    • (2013) Managing compute users
  • 42
    • 84897056250 scopus 로고    scopus 로고
    • OpenStack, Users and projects
    • OpenStack. Users and projects, http://docs. openstack. org/diablo/openstack-compute/admin/content/users-and-projects. html (2013).
    • (2013)
  • 45
    • 0348001131 scopus 로고
    • A transitive closure algorithm
    • doi:10.1007/BF01940892
    • Purdom, P.: A transitive closure algorithm. BIT Numer. Math. 10, 76-94 (1970). doi: 10. 1007/BF01940892.
    • (1970) BIT Numer. Math. , vol.10 , pp. 76-94
    • Purdom, P.1
  • 46
    • 0028513932 scopus 로고
    • Access control: principles and practice
    • Sandhu, R. S., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32, 40-48 (1994).
    • (1994) IEEE Commun. Mag. , vol.32 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 48
    • 0001549660 scopus 로고    scopus 로고
    • The arbac97 model for role-based administration of roles
    • Sandhu, R., Bhamidipati, V., Munawer, Q.: The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 2(1), 105-135 (1999).
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 105-135
    • Sandhu, R.1    Bhamidipati, V.2    Munawer, Q.3
  • 51
    • 28244460211 scopus 로고    scopus 로고
    • Secure interoperation in a multidomain environment employing RBAC policies
    • Shafiq, B., Joshi, J. B. D., Bertino, E., Ghafoor, A.: Secure interoperation in a multidomain environment employing RBAC policies. IEEE Trans. Knowl. Data Eng. 17(11), 1557 (2005).
    • (2005) IEEE Trans. Knowl. Data Eng. , vol.17 , Issue.11 , pp. 1557
    • Shafiq, B.1    Joshi, J.B.D.2    Bertino, E.3    Ghafoor, A.4
  • 53
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., Joshi, J. B., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. & Priv. 8(6), 24-31 (2010).
    • (2010) IEEE Secur. & Priv. , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.2    Ahn, G.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.