Sciweavers

392 search results - page 3 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
13 years 10 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
CCS
2010
ACM
14 years 17 days ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
SRDS
2010
IEEE
13 years 3 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
NOMS
2010
IEEE
157views Communications» more  NOMS 2010»
13 years 4 months ago
Using resource-level information into nonadditive negotiation models for cloud Market environments
—Markets arise as an efficient way of organising resources in Cloud Computing scenarios. In Cloud Computing Markets, Brokers that represent both Clients and Service Providers me...
Mario Macías, Jordi Guitart
COMPUTING
2011
13 years 1 months ago
Private cloud for collaboration and e-Learning services: from IaaS to SaaS
Abstract The idea behind Cloud Computing is to deliver Infrastructure-, Platformand Software-as-a-Service (IaaS, PaaS and SaaS) over the Internet on an easy payper-use business mod...
Frank Dölitzscher, Anthony Sulistio, Christop...