J Han, W Zang, M Yu, R Sandhu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud computing, while becoming more and more popular as a dominant computing platform, introduces new security challenges. When virtual machines are deployed in a …
In an infrastructure as a service (IaaS) cloud, virtualized IT resources such as compute, storage and network are offered on demand by a cloud service provider (CSP) to its tenants …
Provenance data of a system resource provides historical information including the pedigree of and past activities on the resource. This information is useful and has been demonstrated …
Recently, attribute based access control (ABAC) has received considerable attention from the security community for its policy flexibility and dynamic decisionmaking capabilities. The …
R Di Pietro, F Lombardi, M Signorini - Security in the Private Cloud, 2016 - taylorfrancis.com
Such a large collection of resources within virtual hosts is maximized among customers (also known as tenants) with the objective to achieve the best result (ie, to provide the best …
C Ye, SC Cheung, WK Chan - IEEE Transactions on Services …, 2018 - ieeexplore.ieee.org
Service oriented architecture (SOA) provides a flexible platform to build collaborative Internet applications by composing existing self-contained and autonomous services …
K Falzon, E Bodden - International Conference on Principles of Security …, 2016 - Springer
The increased sharing of computational resources elevates the risk of side channels and covert channels, where an entity's security is affected by the entities with which it is co …
Cloud Computing, an emerging internet technology that provides on-demand services to end-users with high scalability in an efficient way over the internet. Enterprises in recent …
Cloud computing has transformed a large portion of the IT industry through its ability to provision infrastructure resources–computing, networking, storage, and software–as …