首页> 外文会议>European Conference on Service-Oriented and Cloud Computing >Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments
【24h】

Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments

机译:在云环境中设计,定义,验证和执行访问控制策略的基础

获取原文

摘要

By embracing cloud computing enterprises are able to boost their agility and productivity whilst realising significant cost savings. However, due to security and privacy concerns, many enterprises are reluctant to migrate their data and operations to the cloud. One way to alleviate these concerns is to devise access control policies that infuse suitable security controls into cloud services. Nevertheless, the complexity inherent in such policies, stemming from the dynamic nature of cloud environments, calls for a framework that provides assurances with respect to the effectiveness of the policies. In this respect, this work proposes a class of constraints, the so-called well-formedness constraints, that provide such assurances by empowering stakeholders to harness the attributes of the policies. Both the policies and the constraints are expressed ontologically hence enabling automated reasoning about the abidance of the policies with the constraints.
机译:通过拥抱云计算,企业可以提高敏捷性和生产力,同时实现大量成本节省。但是,由于安全和隐私问题,许多企业都不愿将其数据和操作迁移到云中。减轻这些担忧的一种方法是设计访问控制策略,将适当的安全控制注入到云服务中。但是,由于云环境的动态性质,此类策略固有的复杂性要求建立一个框架,以提供有关策略有效性的保证。在这方面,这项工作提出了一类约束条件,即所谓的“格式正确性约束条件”,它们可以通过授权利益相关者利用政策的属性来提供此类保证。策略和约束条件都是在本体上表达的,因此可以自动推理是否遵守带有约束条件的策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号