An identity and access management approach for SOA

G Katsikogiannis, S Mitropoulos… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Various Identity and Access Management (IAM) architectural challenges are emerging for
the effective deployment of applications in a Service-Oriented Architecture (SOA) context …

[图书][B] Security in network functions virtualization

Z Zhang, A Meddahi - 2017 - books.google.com
The software and networking industry is experiencing a rapid development and deployment
of Network Functions Visualization (NFV) technology, in both enterprise and cloud data …

Leveraging data provenance to enhance cyber resilience

T Moyer, K Chadha, R Cunningham… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
Building secure systems used to mean ensuring a secure perimeter, but that is no longer the
case. Today's systems are ill-equipped to deal with attackers that are able to pierce …

Designing and Leveraging Trustworthy Provenance-Aware Architectures

AM Bates - 2016 - search.proquest.com
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …

Transforming commodity security policies to enforce Clark-Wilson integrity

D Muthukumaran, S Rueda, N Talele… - Proceedings of the 28th …, 2012 - dl.acm.org
Modern distributed systems are composed from several off-the-shelf components, including
operating systems, virtualization infrastructure, and application packages, upon which some …

Smart resource allocation to improve cloud security

E Caron, F Desprez, J Rouzaud-Cornabas - Security, privacy and trust in …, 2013 - Springer
Virtualization is now widely used in modern datacenters. Thanks to mature software stacks
and the widespread availability of plaforms all over the world, the Cloud is now available for …

Mandatory access protection within cloud systems

M Blanc, A Bousquet, J Briffaut, L Clévy, D Gros… - Security, Privacy and …, 2013 - Springer
In order to guarantee security properties, such as confidentiality and integrity, cryptographic
mechanisms provide encryption and signature of data, but protection is required to control …

Secure, dynamic and distributed access control stack for database applications

ÓM Pereira, DD Regateiro, RL Aguiar - International Journal of …, 2015 - World Scientific
In database applications, access control security layers are mostly developed from tools
provided by vendors of database management systems and deployed in the same servers …

[图书][B] Practical and Secure Architectures Using Ephemeral Cloud Environments

I Polinsky - 2023 - search.proquest.com
Web services are a core component behind many of our daily tasks. The ability for
developers to create applications that are accessible from a range of devices across the …

Auto-FBI: a user-friendly approach for secure access to sensitive content on the web

M Zohrevandi, RA Bazzi - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
We propose a novel and simple approach for securing access to sensitive content on the
web. The approach automates the best manual compartmentalization practices for …