-
2
-
-
84862907810
-
Security challenges for the public cloud
-
jan.-feb.
-
K. Ren, C. Wang, and Q. Wang, "Security challenges for the public cloud," Internet Computing, IEEE, vol. 16, no. 1, pp. 69-73, jan.-feb. 2012.
-
(2012)
Internet Computing, IEEE
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
3
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
march-april
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, march-april 2011.
-
(2011)
Security & Privacy, IEEE
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
5
-
-
79959557055
-
Addressing cloud computing security issues
-
D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, 2012.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
7
-
-
80054066553
-
Contrail virtual execution platform challenges in being part of a cloud federation
-
Berlin, Heidelberg: Springer-Verlag
-
P. Harsh, Y. Jegou, R. G. Cascella, and C. Morin, "Contrail virtual execution platform challenges in being part of a cloud federation," in Proceedings of the 4th European conference on Towards a service-based internet. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 50-61.
-
(2011)
Proceedings of the 4th European Conference on Towards A Service-based Internet
, pp. 50-61
-
-
Harsh, P.1
Jegou, Y.2
Cascella, R.G.3
Morin, C.4
-
8
-
-
84866605844
-
Cloud federation
-
september
-
T. Kurze, M. Klems, D. Bermbach, A. Lenk, S. Tai, and M. Kunze, "Cloud federation," in The Second International Conference on Cloud Computing, GRIDs, and Virtualization, september 2011, pp. 32-38.
-
(2011)
The Second International Conference on Cloud Computing, GRIDs, and Virtualization
, pp. 32-38
-
-
Kurze, T.1
Klems, M.2
Bermbach, D.3
Lenk, A.4
Tai, S.5
Kunze, M.6
-
9
-
-
84857990895
-
Cloud computing security: From single to multi-clouds
-
jan.
-
M. Al Zain, E. Pardede, B. Soh, and J. Thom, "Cloud computing security: From single to multi-clouds," in 45th Hawaii International Conference on System Science, jan. 2012, pp. 5490-5499.
-
(2012)
45th Hawaii International Conference on System Science
, pp. 5490-5499
-
-
Al Zain, M.1
Pardede, E.2
Soh, B.3
Thom, J.4
-
10
-
-
79955805332
-
The byzantine empire in the intercloud
-
Sep.
-
M. Vukolić, "The byzantine empire in the intercloud," SIGACT News, vol. 41, no. 3, pp. 105-111, Sep. 2010.
-
(2010)
SIGACT News
, vol.41
, Issue.3
, pp. 105-111
-
-
Vukolić, M.1
-
11
-
-
70349755377
-
Blueprint for the intercloud - Protocols and formats for cloud computing interoperability
-
may
-
D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, "Blueprint for the intercloud - protocols and formats for cloud computing interoperability," in 4th International Conference on Internet and Web Applications and Services, may 2009, pp. 328-336.
-
(2009)
4th International Conference on Internet and Web Applications and Services
, pp. 328-336
-
-
Bernstein, D.1
Ludvigson, E.2
Sankar, K.3
Diamond, S.4
Morrow, M.5
-
12
-
-
79956268427
-
Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services
-
ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg
-
R. Buyya, R. Ranjan, and R. Calheiros, "Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services," in Algorithms and Architectures for Parallel Processing, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2010, vol. 6081, pp. 13-31.
-
(2010)
Algorithms and Architectures for Parallel Processing
, vol.6081
, pp. 13-31
-
-
Buyya, R.1
Ranjan, R.2
Calheiros, R.3
-
13
-
-
84893716627
-
Inter-cloud architectures and application brokering: Taxonomy and survey
-
N. Grozev and R. Buyya, "Inter-cloud architectures and application brokering: taxonomy and survey," Software: Practice and Experience, 2012.
-
(2012)
Software: Practice and Experience
-
-
Grozev, N.1
Buyya, R.2
-
16
-
-
70349326085
-
Federated identity management
-
ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
D. W. Chadwick, "Federated identity management," in Foundations of Security Analysis and Design V, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009, vol. 5705, pp. 96-120.
-
(2009)
Foundations of Security Analysis and Design V
, vol.5705
, pp. 96-120
-
-
Chadwick, D.W.1
-
17
-
-
84926682848
-
Enabling saml for dynamic identity federation management
-
ser. IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg
-
P. Arias Cabarcos, F. Almenárez Mendoza, A. Marín- López, and D. Díaz-Sánchez, "Enabling saml for dynamic identity federation management," in Wireless and Mobile Networking, ser. IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2009, vol. 308, pp. 173-184.
-
(2009)
Wireless and Mobile Networking
, vol.308
, pp. 173-184
-
-
Arias Cabarcos, P.1
Almenárez Mendoza, F.2
Marín-López, A.3
Díaz-Sánchez, D.4
-
18
-
-
83255193441
-
Identity management directions in future internet
-
december
-
K. Lampropoulos and S. Denazis, "Identity management directions in future internet," Communications Magazine, IEEE, vol. 49, no. 12, pp. 74-83, december 2012.
-
(2012)
Communications Magazine, IEEE
, vol.49
, Issue.12
, pp. 74-83
-
-
Lampropoulos, K.1
Denazis, S.2
-
19
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
ser. Lecture Notes in Computer Science
-
P. Samarati and S. de Vimercati, "Access control: Policies, models, and mechanisms," in Foundations of Security Analysis and Design, ser. Lecture Notes in Computer Science, 2001, vol. 2171, pp. 137-196.
-
(2001)
Foundations of Security Analysis and Design
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
De Vimercati, S.2
-
21
-
-
84894114667
-
Toward quantified risk-adaptive access control for multi-tenant cloud computing
-
October
-
D. Fall, G. Blanc, T. Okuda, Y. Kadobayashi, and S. Yamaguchi, "Toward Quantified Risk-Adaptive Access Control for Multi-tenant Cloud Computing," in Proceedings of the 6th Joint Workshop on Information Security, October 2011.
-
(2011)
Proceedings of the 6th Joint Workshop on Information Security
-
-
Fall, D.1
Blanc, G.2
Okuda, T.3
Kadobayashi, Y.4
Yamaguchi, S.5
-
22
-
-
70450235104
-
Extending access control models with break-glass
-
New York, NY, USA: ACM
-
A. D. Brucker and H. Petritsch, "Extending access control models with break-glass," in Proceedings of the 14th ACM symposium on Access control models and technologies. New York, NY, USA: ACM, 2009, pp. 197-206.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 197-206
-
-
Brucker, A.D.1
Petritsch, H.2
-
23
-
-
62349136782
-
Contextual risk-based access control
-
N. N. Diep, S. Lee, Y.-K. Lee, and H. Lee, "Contextual risk-based access control," in Security and Management, 2007, pp. 406-412.
-
(2007)
Security and Management
, pp. 406-412
-
-
Diep, N.N.1
Lee, S.2
Lee, Y.-K.3
Lee, H.4
-
24
-
-
33747310371
-
Introduction to identity management risk metrics
-
G. Peterson, "Introduction to identity management risk metrics," Security & Privacy, IEEE, vol. 4, no. 4, pp. 88-91, 2006.
-
(2006)
Security & Privacy, IEEE
, vol.4
, Issue.4
, pp. 88-91
-
-
Peterson, G.1
-
25
-
-
84861303808
-
Challenges of operationalizing dynamic system access control: Transitioning from abac to radac
-
march
-
B. Farroha and D. Farroha, "Challenges of operationalizing dynamic system access control: Transitioning from abac to radac," in IEEE International Systems Conference, march 2012, pp. 1-7.
-
(2012)
IEEE International Systems Conference
, pp. 1-7
-
-
Farroha, B.1
Farroha, D.2
-
26
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
P. C. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A. Reninger, "Fuzzy multi-level security: An experiment on quantified risk-adaptive access control," in IEEE Symposium on Security and Privacy, 2007, pp. 222-230.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 222-230
-
-
Cheng, P.C.1
Rohatgi, P.2
Keser, C.3
Karger, P.4
Wagner, G.5
Reninger, A.6
-
27
-
-
77954482365
-
Risk-based access control systems built on fuzzy inferences
-
New York, NY, USA: ACM
-
Q. Ni, E. Bertino, and J. Lobo, "Risk-based access control systems built on fuzzy inferences," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2010, pp. 250-260.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 250-260
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
28
-
-
85139863684
-
Risk-based security decisions under uncertainty
-
New York, NY, USA: ACM
-
I. Molloy, L. Dickens, C. Morisset, P.-C. Cheng, J. Lobo, and A. Russo, "Risk-based security decisions under uncertainty," in Proceedings of the second ACM conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2012, pp. 157-168.
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy
, pp. 157-168
-
-
Molloy, I.1
Dickens, L.2
Morisset, C.3
Cheng, P.-C.4
Lobo, J.5
Russo, A.6
-
29
-
-
0037855622
-
-
RFC 2904 (Informational), Internet Engineering Task Force, Aug. [Online]
-
J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege, and D. Spence, "AAA Authorization Framework," RFC 2904 (Informational), Internet Engineering Task Force, Aug. 2000. [Online]. Available: http://www.ietf.org/rfc/rfc2904.txt
-
(2000)
AAA Authorization Framework
-
-
Vollbrecht, J.1
Calhoun, P.2
Farrell, S.3
Gommans, L.4
Gross, G.5
De Bruijn, B.6
De Laat, C.7
Holdrege, M.8
Spence, D.9
-
30
-
-
70349575297
-
-
OASIS. [Online]
-
OASIS. (2003) A brief introduction to xacml. [Online]. Available: https://www.oasisopen.org/committees/download.php/2713/Brief Introduction to XACML.html
-
(2003)
A Brief Introduction to Xacml
-
-
-
32
-
-
84894170461
-
Risk-based dynamic access control for a highly scalable cloud federation
-
D. R. dos Santos, C. M. Westphall, and C. B. Westphall, "Risk-based dynamic access control for a highly scalable cloud federation," in 7th International Conference on Emerging Security Information Systems and Technologies, 2013, pp. 8-13.
-
(2013)
7th International Conference on Emerging Security Information Systems and Technologies
, pp. 8-13
-
-
Dos Santos, D.R.1
Westphall, C.M.2
Westphall, C.B.3
-
34
-
-
84870401072
-
Using risk in access control for cloud-assisted ehealth
-
M. Sharma, Y. Bai, S. Chung, and L. Dai, "Using risk in access control for cloud-assisted ehealth," in IEEE 14th International Conference on High Performance Computing and Communication, 2012, 2012, pp. 1047-1052.
-
(2012)
IEEE 14th International Conference on High Performance Computing and Communication, 2012
, pp. 1047-1052
-
-
Sharma, M.1
Bai, Y.2
Chung, S.3
Dai, L.4
-
35
-
-
33947625881
-
-
National Institute of Standards and Technology, Tech. Rep
-
V. Hu, D. Ferraiolo, and D. R. Kuhn, "Assessment of Access Control Systems, Interagency Report 7316," National Institute of Standards and Technology, Tech. Rep., 2006.
-
(2006)
Assessment of Access Control Systems, Interagency Report 7316
-
-
Hu, V.1
Ferraiolo, D.2
Kuhn, D.R.3
-
36
-
-
84867249207
-
A metric-based approach to assess risk for
-
on cloud" federated identity management
-
P. Arias-Cabarcos, F. Almenárez-Mendoza, A. Marín- López, D. Díaz-Sánchez, and R. Sánchez-Guerrero, "A metric-based approach to assess risk for "on cloud" federated identity management," Journal of Network and Systems Management, vol. 20, pp. 513-533, 2012.
-
(2012)
Journal of Network and Systems Management
, vol.20
, pp. 513-533
-
-
Arias-Cabarcos, P.1
Almenárez-Mendoza, F.2
Marín-López, A.3
Díaz-Sánchez, D.4
Sánchez-Guerrero, R.5
-
37
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
june
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and cloud computing: Intercloud identity management infrastructure," in 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, june 2010, pp. 263-265.
-
(2010)
19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
38
-
-
78049350996
-
Intercloud directory and exchange protocol detail using xmpp and rdf
-
july
-
D. Bernstein and D. Vij, "Intercloud directory and exchange protocol detail using xmpp and rdf," in 6th World Congress on Services, july 2010, pp. 431-438.
-
(2010)
6th World Congress on Services
, pp. 431-438
-
-
Bernstein, D.1
Vij, D.2
-
39
-
-
85088758584
-
The contrail approach to cloud federations
-
M. Coppola, P. Dazzi, A. Lazouski, F. Martinelli, P. Mori, J. Jensen, I. Johnson, and P. Kershaw, "The contrail approach to cloud federations," in Proceedings of the International Symposium on Grids and Clouds, 2012.
-
(2012)
Proceedings of the International Symposium on Grids and Clouds
-
-
Coppola, M.1
Dazzi, P.2
Lazouski, A.3
Martinelli, F.4
Mori, P.5
Jensen, J.6
Johnson, I.7
Kershaw, P.8
|