-
1
-
-
77950347409
-
A view of cloud computing
-
Apr. [Online]
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010. [Online]. Available: http://doi.acm.org/10.1145/1721654.1721672
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84883471347
-
Savi testbed: Control and management of converged virtual ict resources
-
IEEE
-
J.-M. Kang, H. Bannazadeh, and A. Leon-Garcia, "Savi testbed: Control and management of converged virtual ict resources," in Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. IEEE, 2013, pp. 664-667.
-
(2013)
Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on
, pp. 664-667
-
-
Kang, J.-M.1
Bannazadeh, H.2
Leon-Garcia, A.3
-
4
-
-
74049112206
-
Cloud security issues
-
B. Kandukuri, V. Paturi, and A. Rakshit, "Cloud security issues," in Services Computing, 2009. SCC '09. IEEE International Conference on, 2009, pp. 517-520.
-
(2009)
Services Computing, 2009. SCC '09. IEEE International Conference on
, pp. 517-520
-
-
Kandukuri, B.1
Paturi, V.2
Rakshit, A.3
-
6
-
-
84903828024
-
-
P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. B. Othmane, L. Lilien, and M. Linderman, "An entity-centric approach for privacy and identity management in cloud computing."
-
An Entity-centric Approach for Privacy and Identity Management in Cloud Computing
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Othmane, L.B.5
Lilien, L.6
Linderman, M.7
-
7
-
-
84891937506
-
Identity management in cloud computing-A review
-
K. Gunjan, G. Sahoo, and R. Tiwari, "Identity management in cloud computing-a review," International Journal of Engineering, vol. 1, no. 4, 2012.
-
(2012)
International Journal of Engineering
, vol.1
, Issue.4
-
-
Gunjan, K.1
Sahoo, G.2
Tiwari, R.3
-
8
-
-
72049120733
-
Id management among clouds
-
IEEE
-
X. Huang, T. Zhang, and Y. Hou, "Id management among clouds," in Future Information Networks, 2009. ICFIN 2009. First International Conference on. IEEE, 2009, pp. 237-241.
-
(2009)
Future Information Networks, 2009. ICFIN 2009. First International Conference on
, pp. 237-241
-
-
Huang, X.1
Zhang, T.2
Hou, Y.3
-
9
-
-
77954927272
-
Identity federation broker for service cloud
-
H. Y. Huang, B. Wang, X. X. Liu, and J. M. Xu, "Identity federation broker for service cloud," in Service Sciences (ICSS), 2010 International Conference on, 2010, pp. 115-120.
-
(2010)
Service Sciences (ICSS), 2010 International Conference on
, pp. 115-120
-
-
Huang, H.Y.1
Wang, B.2
Liu, X.X.3
Xu, J.M.4
-
10
-
-
47949126506
-
Distributed identity management model for digital ecosystems
-
IEEE
-
H. Koshutanski, M. Ion, and L. Telesca, "Distributed identity management model for digital ecosystems," in Emerging Security Information, Systems, and Technologies, 2007. Secure Ware 2007. The International Conference on. IEEE, 2007, pp. 132-138.
-
(2007)
Emerging Security Information, Systems, and Technologies, 2007. Secure Ware 2007. The International Conference on
, pp. 132-138
-
-
Koshutanski, H.1
Ion, M.2
Telesca, L.3
-
11
-
-
70350756524
-
Beyond virtual data centers: Toward an open resource control architecture
-
ACM
-
J. Chase, L. Grit, D. Irwin, V. Marupadi, P. Shivam, and A. Yumerefendi, "Beyond virtual data centers: Toward an open resource control architecture," in in Selected Papers from the International Conference on the Virtual Computing Initiative (ACM Digital Library), ACM, 2007.
-
(2007)
Selected Papers from the International Conference on the Virtual Computing Initiative (ACM Digital Library)
-
-
Chase, J.1
Grit, L.2
Irwin, D.3
Marupadi, V.4
Shivam, P.5
Yumerefendi, A.6
-
13
-
-
0034513874
-
Intrusion confinement by isolation in information systems
-
P. Liu, S. Jajodia, and C. D. McCollum, "Intrusion confinement by isolation in information systems," Journal of Computer Security, vol. 8, 2000.
-
(2000)
Journal of Computer Security
, vol.8
-
-
Liu, P.1
Jajodia, S.2
McCollum, C.D.3
-
14
-
-
80052096520
-
I-rbac: Isolation enabled role-based access control
-
N. Gunti, W. Sun, and M. Niamat, "I-rbac: Isolation enabled role-based access control," in Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on, 2011, pp. 79-86.
-
(2011)
Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on
, pp. 79-86
-
-
Gunti, N.1
Sun, W.2
Niamat, M.3
-
15
-
-
0030086382
-
Rolebased access control models
-
Feb. [Online]
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
16
-
-
84956993736
-
Role-based authorization constraints specification
-
Nov. [Online]
-
G.-J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 207-226, Nov. 2000. [Online]. Available: http://doi.acm.org/10.1145/382912. 382913
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
17
-
-
84904184368
-
From abac to zbac: The evolution of access control models
-
A. H. Karp, H. Haury, and M. H. Davis, "From abac to zbac: the evolution of access control models," Hewlett-Packard Development Company, LP, vol. 21, 2009.
-
(2009)
Hewlett-Packard Development Company, LP
, vol.21
-
-
Karp, A.H.1
Haury, H.2
Davis, M.H.3
-
18
-
-
84873840320
-
Attribute based access control (abac)-based cross-domain access control in service-oriented architecture (soa)
-
N. Dan, S. Hua-Ji, C. Yuan, and G. Jia-Hu, "Attribute based access control (abac)-based cross-domain access control in service-oriented architecture (soa)," in Computer Science Service System (CSSS), 2012 International Conference on, 2012, pp. 1405-1408.
-
(2012)
Computer Science Service System (CSSS), 2012 International Conference on
, pp. 1405-1408
-
-
Dan, N.1
Hua-Ji, S.2
Yuan, C.3
Jia-Hu, G.4
-
20
-
-
0242540371
-
Pbdm: A flexible delegation model in rbac
-
ser. SACMAT '03. New York, NY, USA: ACM, [Online]
-
X. Zhang, S. Oh, and R. Sandhu, "Pbdm: a flexible delegation model in rbac," in Proceedings of the eighth ACM symposium on Access control models and technologies, ser. SACMAT '03. New York, NY, USA: ACM, 2003, pp. 149-157. [Online]. Available: http://doi.acm.org/10.1145/775412.775431
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 149-157
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
-
21
-
-
84883471347
-
SAVI testbed: Control and management of converged virtual ICT resources
-
Ghent, Belgium
-
J.-M. Kang, H. Bannazadeh, and A. Leon-Garcia, "SAVI testbed: Control and management of converged virtual ICT resources," in IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, 2013, pp. 664-667.
-
(2013)
IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)
, pp. 664-667
-
-
Kang, J.-M.1
Bannazadeh, H.2
Leon-Garcia, A.3
|