Wu et al., 2013 - Google Patents
Design and implementation of access control as a service for IaaS cloudWu et al., 2013
View PDF- Document ID
- 5016727208476833960
- Author
- Wu R
- Zhang X
- Ahn G
- Sharifi H
- Xie H
- Publication year
- Publication venue
- Science
External Links
Snippet
Organizations and enterprises have been outsourcing their computation, storage, and workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity and high diversity of IaaS cloud environment demand a comprehensive and finegrained …
- 238000003860 storage 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gholami et al. | Security and privacy of sensitive data in cloud computing: a survey of recent developments | |
| Almorsy et al. | An analysis of the cloud computing security problem | |
| CN107046530B (en) | Coordination management system for heterogeneous agile information technology environment | |
| Hashizume et al. | An analysis of security issues for cloud computing | |
| Bouayad et al. | Cloud computing: Security challenges | |
| Anjana et al. | Security concerns and countermeasures in cloud computing: a qualitative analysis | |
| Hu et al. | General access control guidance for cloud systems | |
| Watson | A Decade of OS Access-control Extensibility: Open source security foundations for mobile and embedded devices | |
| Wu et al. | Acaas: Access control as a service for iaas cloud | |
| Riad et al. | AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing | |
| Bleikertz et al. | Secure cloud maintenance: protecting workloads against insider attacks | |
| Jin et al. | Role and attribute based collaborative administration of intra-tenant cloud iaas | |
| Ray et al. | Trust-based access control for secure cloud computing | |
| Pasquier et al. | Flowk: Information flow control for the cloud | |
| Deng et al. | Towards trustworthy health platform cloud | |
| US11695777B2 (en) | Hybrid access control model in computer systems | |
| Khan et al. | Design and deployment of a trusted eucalyptus cloud | |
| Gholami | Security and privacy of sensitive data in cloud computing | |
| Wu et al. | Design and implementation of access control as a service for IaaS cloud | |
| Sundararajan et al. | Preventing Insider attacks in the Cloud | |
| Anupa et al. | Cloud workflow and security: A survey | |
| Alvi et al. | A review on cloud computing security issues & challenges | |
| Sifou et al. | Different access control mechanisms for data security in cloud computing | |
| Park et al. | SecureDom: secure mobile-sensitive information protection with domain separation | |
| Kumar et al. | Ensuring security for virtualization in cloud services |