Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1833006.1833158guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Adaptive security management model in the cloud computing environment

Published: 07 February 2010 Publication History

Abstract

This paper suggests an adaptive access algorithm to decide the access control to the resources using an improved RBAC technique to solve more complex and difficult problems in the cloud computing environment. And the proposed model determines dynamically security level and access control for the common resources. Therefore, it is supposed to provide appropriate security services according to the dynamic changes of the common resources.

References

[1]
James Staten, "Is Cloud Computing Ready for the Enterprise?," Forrester Research, March 2008.(http://www.forrester.com/rb/research)
[2]
A. K. Dey, "Providing Architectural Support for Building ContextAware Applications," Ph. D. Dissertation, Georgia Institute of Technology, 2000.
[3]
Guanling Chen, "A survey of context-aware mobile computing research," Dartmouth Univ.TR2000-38
[4]
Kong Guangqian, Li Jianshi. "Research on RBAC-based separation of duty constraints," Journal of Information and Computing Science, Vol.2, pp. 235-240, 2007.
[5]
NIST, (http://csrc.nist.gov/rbac/)
[6]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E.Youman., "Rolebased access control models," IEEE Computer, Vol. 29, No.2, pp. 38-47, February 1996.
[7]
RJ. Hulsebosch, "Context Sensitive Access Control," Symposium on Access Control Models and Technologies, pp. 111-119, June 2005.
[8]
Seokhwan Yang, Mokdong Chung, "Context-Aware Security Service for Healthcare System in RFID/USN Environments using Fuzzy C-Means Algorithm," 3rd International Conference on Ubiquitous Information Technologies & Applications, Vietnam, pp. 448-452, December 2008.
[9]
R.L.Keeney and H.Raiffa, "Decisions with Multiple Objectives: Preferences and Value Tradeoffs," John Wiley & Sons, New York, NY, 1976.
[10]
D. Winterfeld, von and W. Edwards, "Decision Analysis and Behavioral Research," Cambridge, England: Cambridge University Press.
[11]
"Rules for Using Multi-Attribute Utility Theory for Estimating a User's Interests," Proceedings of the ninth Gl-Workshop. ABIS-Adaptivitlltund Benutzermodellierung in interaktiven softwaresystemen, Dortmund, Germany, 2001.
[12]
L. Martignon and U. Hoffrage, "Why Does One-Reason Decision Making Work? In Simple Heuristics That Make Us Smart," Oxford University Press, New York, pp. 119-140,1999.
[13]
Brickell, E., Camenisch, J., Chen, L., "Direct anonymous attestation," CCS'04 11th ACM conference on Computer and communications security, New York, United States of America, pp. 132-145. ACM Press, New York, 2004.
[14]
Quisquater Jean-Jacques, "How to Explain Zero-Knowledge Protocols to Your Children," Advances in Cryptology - CRYPTO'89 Proceedings, Lecture Notes In Computer Science,Vol.435, pp. 628-631, 1989.
[15]
E. Brickell, J. Camenisch, and L. Chen, "Direct anonymous attestation," In Proceedings of 11th ACM Conference on Computer and Communications Security, ACM Press, 2004 Practical Solutions to Identification and Signature Problems, ACPC 86, LNCS, 1987.
[16]
M.J.Convington, "Generalized Role-Based Access Control for Securing Future Applications," Proc of 23rd National Information Systems Security Conference (NISSC), Baltimore, pp. 115-125, 2000.
[17]
M.J. Moyer, M.Ahamad, "Generalized Role-Based Access Control," Proc of IEEE Int'l Conf. on Distributed Computing Systems (ICDSC2001), Mesa, pp. 391-398, 2001.

Cited By

View all
  • (2018)A Survey on Self-Adaptive Security for Large-scale Open EnvironmentsACM Computing Surveys10.1145/323414851:5(1-42)Online publication date: 9-Oct-2018
  • (2017)A game-theoretic decision-making framework for engineering self-protecting software systemsProceedings of the 39th International Conference on Software Engineering Companion10.1109/ICSE-C.2017.43(449-452)Online publication date: 20-May-2017
  • (2014)A formal framework for modelling complex network management systemsJournal of Network and Computer Applications10.5555/2773807.277404740:C(255-269)Online publication date: 1-Apr-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICACT'10: Proceedings of the 12th international conference on Advanced communication technology
February 2010
1712 pages
ISBN:9781424454273

Publisher

IEEE Press

Publication History

Published: 07 February 2010

Author Tags

  1. DAA protocol
  2. RBAC
  3. access control
  4. cloud computing
  5. security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)A Survey on Self-Adaptive Security for Large-scale Open EnvironmentsACM Computing Surveys10.1145/323414851:5(1-42)Online publication date: 9-Oct-2018
  • (2017)A game-theoretic decision-making framework for engineering self-protecting software systemsProceedings of the 39th International Conference on Software Engineering Companion10.1109/ICSE-C.2017.43(449-452)Online publication date: 20-May-2017
  • (2014)A formal framework for modelling complex network management systemsJournal of Network and Computer Applications10.5555/2773807.277404740:C(255-269)Online publication date: 1-Apr-2014
  • (2012)A new RBAC based access control model for cloud computingProceedings of the 7th international conference on Advances in Grid and Pervasive Computing10.1007/978-3-642-30767-6_24(279-288)Online publication date: 11-May-2012

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media