2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC) 2015
DOI: 10.1109/ucc.2015.45
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing Security and Assurance Properties in Cloud Environment

Abstract: Before deploying their infrastructure (resources, data, communications, ...) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But describing and enforcing security properties and getting strong evidences of it is a complex task.To address th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Therefore, it is important to ensure that code behaviour is in line with the access control [231], [232] policy. Further, a security assurance methodology is needed to obtain firm evidence that the security requirements of the companies are well defined and enforced [233].…”
Section: Research Gaps and Recommendationsmentioning
confidence: 99%
“…Therefore, it is important to ensure that code behaviour is in line with the access control [231], [232] policy. Further, a security assurance methodology is needed to obtain firm evidence that the security requirements of the companies are well defined and enforced [233].…”
Section: Research Gaps and Recommendationsmentioning
confidence: 99%
“…For instance, authenticity can be achieved by providing either password-based or biometric authentication. In the literature, mechanisms are sometimes considered as part of complex property definition [10]; in this paper, we decouple property declaration (i.e., the property to be evaluated -( pr,l)) from its procedural definition (i.e., how to achieve property -mec) to better distinguish the goal and target of our adaptation technique. We consider different classes of properties such as security (i.e., CIA), performance, anonymity, consistency.…”
Section: Non-functional Propertiesmentioning
confidence: 99%
“…Each scenario has then been evaluated in 4 settings varying the remaining two parameters in (3,3), (3,20), (20,3), (20,20). Figure 3(d)-3(f) shows the execution time when two parameters among number of tenants, property classes, and levels, are selected and varied between (10,10) and (60,60) (step 10). Each scenario (10,10,10) and (60,60,60) (step 10).…”
Section: Performancementioning
confidence: 99%
See 1 more Smart Citation