메뉴 건너뛰기




Volumn 12, Issue 4s, 2016, Pages

Intercrossed access controls for secure financial services on multimedia big data in cloud systems

Author keywords

Cloud computing; Intercrossed access control; Multimedia big data; Secure financial services; Trustmanagement

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; FINANCE; MULTIMEDIA SERVICES; SEMANTICS;

EID: 84989338233     PISSN: 15516857     EISSN: 15516865     Source Type: Journal    
DOI: 10.1145/2978575     Document Type: Article
Times cited : (105)

References (38)
  • 1
    • 84897808665 scopus 로고    scopus 로고
    • Authorization control for a semantic data repository through an inference policy engine
    • 2013
    • A. Alamri, P. Bertok, and J. Thom. 2013. Authorization control for a semantic data repository through an inference policy engine. IEEE Transactions on Dependable and Secure Computing 10, 6 (2013), 328-340.
    • (2013) IEEE Transactions on Dependable and Secure Computing , vol.10 , Issue.6 , pp. 328-340
    • Alamri, A.1    Bertok, P.2    Thom, J.3
  • 2
    • 81455143669 scopus 로고    scopus 로고
    • The integration of corporate security strategies in collaborative business processes
    • 2011
    • Y. Badr, F. Biennier, and S. Tata. 2011. The integration of corporate security strategies in collaborative business processes. IEEE Transactions on Services Computing 4, 3 (2011), 243-254.
    • (2011) IEEE Transactions on Services Computing , vol.4 , Issue.3 , pp. 243-254
    • Badr, Y.1    Biennier, F.2    Tata, S.3
  • 5
    • 84921505568 scopus 로고    scopus 로고
    • Hiresome-II: Towards privacy-Aware cross-cloud service composition for big data applications
    • 2015
    • W. Dou, X. Zhang, J. Liu, and J. Chen. 2015. HireSome-II: Towards privacy-Aware cross-cloud service composition for big data applications. IEEE Transactions on Parallel and Distributed Systems 26, 2 (2015), 455-466.
    • (2015) IEEE Transactions on Parallel and Distributed Systems , vol.26 , Issue.2 , pp. 455-466
    • Dou, W.1    Zhang, X.2    Liu, J.3    Chen, J.4
  • 6
    • 78650919710 scopus 로고    scopus 로고
    • Vulnerabilities of fingerprint reader to fake fingerprints attacks
    • 2011
    • M. Espinoza, C. Champod, and P. Margot. 2011. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic Science International 204, 1 (2011), 41-49.
    • (2011) Forensic Science International , vol.204 , Issue.1 , pp. 41-49
    • Espinoza, M.1    Champod, C.2    Margot, P.3
  • 8
    • 84992705739 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile cloud computing in heterogeneous 5g
    • 2015
    • K. Gai, M. Qiu, L. Tao, and Y. Zhu. 2015a. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks (2015), 1-10.
    • (2015) Security and Communication Networks , pp. 1-10
    • Gai, K.1    Qiu, M.2    Tao, L.3    Zhu, Y.4
  • 10
    • 84949627105 scopus 로고    scopus 로고
    • Dynamic energy-Aware cloudlet-based mobile cloud computing model for green computing
    • 2015
    • K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong. 2015c. Dynamic energy-Aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications 59 (2015), 46-54.
    • (2015) Journal of Network and Computer Applications , vol.59 , pp. 46-54
    • Gai, K.1    Qiu, M.2    Zhao, H.3    Tao, L.4    Zong, Z.5
  • 11
    • 84934756449 scopus 로고    scopus 로고
    • Abductive analysis of administrative policies in rule-based access control
    • 2014
    • P. Gupta, S. Stoller, and Z. Xu. 2014. Abductive analysis of administrative policies in rule-based access control. IEEE Transactions on Dependable and Secure Computing 11, 5 (2014), 412-424.
    • (2014) IEEE Transactions on Dependable and Secure Computing , vol.11 , Issue.5 , pp. 412-424
    • Gupta, P.1    Stoller, S.2    Xu, Z.3
  • 12
    • 84878326313 scopus 로고    scopus 로고
    • Multiparty access control for online social networks: Model and mechanisms
    • 2013
    • H. Hu, G. Ahn, and J. Jorgensen. 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (2013), 1614-1627.
    • (2013) IEEE Transactions on Knowledge and Data Engineering , vol.25 , Issue.7 , pp. 1614-1627
    • Hu, H.1    Ahn, G.2    Jorgensen, J.3
  • 13
    • 84856020580 scopus 로고    scopus 로고
    • An exploratory study of the relationships between selected contextual factors and information security concerns in global financial services institutions
    • 2011
    • P. Ifinedo. 2011. An exploratory study of the relationships between selected contextual factors and information security concerns in global financial services institutions. Journal of Information Privacy and Security 7, 1 (2011), 25-49.
    • (2011) Journal of Information Privacy and Security , vol.7 , Issue.1 , pp. 25-49
    • Ifinedo, P.1
  • 14
    • 84940106029 scopus 로고    scopus 로고
    • The effects of national culture on the assessment of information security threats and controls in financial services industry
    • 2014
    • P. Ifinedo. 2014. The effects of national culture on the assessment of information security threats and controls in financial services industry. International Journal of Electronic Business Management 12, 2 (2014), 75.
    • (2014) International Journal of Electronic Business Management , vol.12 , Issue.2 , pp. 75
    • Ifinedo, P.1
  • 15
    • 84962857221 scopus 로고    scopus 로고
    • Privacy protection for preventing data over-collection in smart city
    • Y. Li, W. Dai, Z. Ming, and M. Qiu. 2015. Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers PP (2015), 1. Issue 99.
    • (2015) IEEE Transactions on Computers PP , vol.2015 , Issue.1 , pp. 99
    • Li, Y.1    Dai, W.2    Ming, Z.3    Qiu, M.4
  • 17
    • 84890372403 scopus 로고    scopus 로고
    • Comprehensive security integrated model and ontology within cloud computing
    • 2013
    • F. Liu, H. Lo, L. Chen, and W. Lee. 2013. Comprehensive security integrated model and ontology within cloud computing. J. of Internet Technology 14, 6 (2013), 935-946.
    • (2013) J. of Internet Technology , vol.14 , Issue.6 , pp. 935-946
    • Liu, F.1    Lo, H.2    Chen, L.3    Lee, W.4
  • 18
    • 84948658189 scopus 로고    scopus 로고
    • Mitigating on-off attacks in the internet of things using a distributed trust management scheme
    • 2015
    • C. Mendoza and J. Kleinschmidt. 2015. Mitigating on-off attacks in the Internet of Things using a distributed trust management scheme. International Journal of Distributed Sensor Networks 2015 (2015), 1-8.
    • (2015) International Journal of Distributed Sensor Networks , vol.2015 , pp. 1-8
    • Mendoza, C.1    Kleinschmidt, J.2
  • 19
    • 84911901976 scopus 로고    scopus 로고
    • Kasr: A keyword-Aware service recommendation method on mapreduce for big data application
    • 2014
    • S. Meng, W. Dou, X. Zhang, and J. Chen. 2014. KASR: A keyword-Aware service recommendation method on MapReduce for big data application. IEEE Transactions on Parallel & Distributed Systems 25, 12 (2014), 3221-3231.
    • (2014) IEEE Transactions on Parallel & Distributed Systems , vol.25 , Issue.12 , pp. 3221-3231
    • Meng, S.1    Dou, W.2    Zhang, X.3    Chen, J.4
  • 20
    • 84861527324 scopus 로고    scopus 로고
    • Sub-trees modification ofhuffman coding for stuffing bits reduction and efficient nrzi data transmission
    • 2012
    • Y. Pai, F. Cheng, S. Lu, and S. Ruan. 2012. Sub-trees modification ofHuffman coding for stuffing bits reduction and efficient NRZI data transmission. IEEE Transactions on Broadcasting 58, 2 (2012), 221-227.
    • (2012) IEEE Transactions on Broadcasting , vol.58 , Issue.2 , pp. 221-227
    • Pai, Y.1    Cheng, F.2    Lu, S.3    Ruan, S.4
  • 22
    • 84987611000 scopus 로고    scopus 로고
    • Proactive user-centric secure data scheme using attribute-based semantic access controls formobile clouds in financial industry
    • M. Qiu, K. Gai, B. Thuraisingham, L. Tao, and H. Zhao. 2016. Proactive user-centric secure data scheme using attribute-based semantic access controls formobile clouds in financial industry. Future Generation Computer Systems PP (2016), 1.
    • (2016) Future Generation Computer Systems PP , pp. 1
    • Qiu, M.1    Gai, K.2    Thuraisingham, B.3    Tao, L.4    Zhao, H.5
  • 23
    • 82155167643 scopus 로고    scopus 로고
    • Energy efficient security algorithm for power grid wide area monitoring system
    • 2011
    • M. Qiu,W. Gao, M. Chen, J. Niu, and L. Zhang. 2011. Energy efficient security algorithm for power grid wide area monitoring system. IEEE Transactions on Smart Grid 2, 4 (2011), 715-723.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.4 , pp. 715-723
    • Qiu, M.1    Gao, W.2    Chen, M.3    Niu, J.4    Zhang, L.5
  • 24
    • 65849231067 scopus 로고    scopus 로고
    • Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems
    • 2009
    • M. Qiu and E. Sha. 2009. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Transactions on Design Automation of Electronic Systems 14, 2 (2009), 25.
    • (2009) ACM Transactions on Design Automation of Electronic Systems , vol.14 , Issue.2 , pp. 25
    • Qiu, M.1    Sha, E.2
  • 25
    • 84946905548 scopus 로고    scopus 로고
    • Phase-change memory optimization for green cloud with genetic algorithm
    • 2015
    • M. Qiu, M. Zhong, J. Li, K. Gai, and Z. Zong. 2015. Phase-change memory optimization for green cloud with genetic algorithm. IEEE Transactions on Computers 64, 12 (2015), 3528-3540.
    • (2015) IEEE Transactions on Computers , vol.64 , Issue.12 , pp. 3528-3540
    • Qiu, M.1    Zhong, M.2    Li, J.3    Gai, K.4    Zong, Z.5
  • 27
    • 20844442173 scopus 로고    scopus 로고
    • Applying semantic knowledge to real-time update of access control policies
    • 2005
    • I. Ray. 2005. Applying semantic knowledge to real-time update of access control policies. IEEE Transactions on Knowledge and Data Engineering 17, 6 (2005), 844-858.
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.6 , pp. 844-858
    • Ray, I.1
  • 28
    • 80555127389 scopus 로고    scopus 로고
    • A semantically enhanced upnp control point for sharing multimedia content
    • 2011
    • M. Rico, O. Corcho, V. Méndez, and J. Gómez-Pérez. 2011. A semantically enhanced UPnP control point for sharing multimedia content. IEEE Internet Computing 15, 6 (2011), 58-64.
    • (2011) IEEE Internet Computing , vol.15 , Issue.6 , pp. 58-64
    • Rico, M.1    Corcho, O.2    Méndez, V.3    Gómez-Pérez, J.4
  • 29
    • 81255188083 scopus 로고    scopus 로고
    • Software support for building automation requirements engineering-An application of semantic web technologies in automation
    • 2011
    • S. Runde and A. Fay. 2011. Software support for building automation requirements engineering-An application of semantic web technologies in automation. IEEE Transactions on Industrial Informatics 7, 4 (2011), 723-730.
    • (2011) IEEE Transactions on Industrial Informatics , vol.7 , Issue.4 , pp. 723-730
    • Runde, S.1    Fay, A.2
  • 32
    • 84863343959 scopus 로고    scopus 로고
    • Opass: A user authentication protocol resistant to password stealing and password reuse attacks
    • 2012
    • H. Sun, Y. Chen, and Y. Lin. 2012a. oPass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 651-663.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.2 , pp. 651-663
    • Sun, H.1    Chen, Y.2    Lin, Y.3
  • 36
    • 67651165303 scopus 로고    scopus 로고
    • Enabling secure service discovery in mobile healthcare enterprise networks
    • 2009
    • A. Toninelli, R. Montanari, and A. Corradi. 2009. Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wireless Communications 16, 3 (2009), 24-32.
    • (2009) IEEE Wireless Communications , vol.16 , Issue.3 , pp. 24-32
    • Toninelli, A.1    Montanari, R.2    Corradi, A.3
  • 38
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • 2012
    • D. Zissis and D. Lekkas. 2012. Addressing cloud computing security issues. Future Generation computer systems 28, 3 (2012), 583-592.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.