首页> 外文会议>IFIP WG 6.11 conference on e-business, e-services, and e-society >A Methodology for the Development and Verification of Access Control Systems in Cloud Computing
【24h】

A Methodology for the Development and Verification of Access Control Systems in Cloud Computing

机译:云计算中访问控制系统的开发和验证方法

获取原文

摘要

Cloud computing is an emergent technology that has generated significant interest in the marketplace and is forecasted for high growth. Moreover, Cloud computing has a great impact on different type of users from individual consumers and businesses to small and medium size (SMBs) and enterprise businesses. Although there are many benefits to adopting Cloud computing, there are significant barriers to adoption, viz. security and privacy. In this paper, we focus on carefully planning security aspects regarding access control of Cloud computing solutions before implementing them and, furthermore, on ensuring they satisfy particular organizational security requirements. Specifically, we propose a methodology for the development of access control systems. The methodology is capable of utilizing existing security requirements engineering approaches for the definition and evaluation of access control models, and verification of access control systems against organizational security requirements using techniques that are based on formal methods. A proof of concept example is provided that demonstrates the application of the proposed methodology on Cloud computing systems.
机译:云计算是一种新兴技术,已引起了市场的极大兴趣,并预计将实现高速增长。此外,云计算对不同类型的用户(从个人消费者和企业到中小型(SMB)和企业企业)都具有巨大影响。尽管采用云计算有很多好处,但是采用时存在很大的障碍。安全和隐私。在本文中,我们专注于在实施之前对与云计算解决方案的访问控制有关的安全方面进行仔细规划,此外,还要确保它们满足特定的组织安全要求。具体来说,我们提出了一种开发访问控制系统的方法。该方法能够利用现有的安全需求工程方法来定义和评估访问控制模型,并使用基于正式方法的技术针对组织的安全需求对访问控制系统进行验证。提供了概念证明示例,该示例演示了所提出的方法在云计算系统上的应用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号