2018 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2018
DOI: 10.1109/hpcs.2018.00113
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud Brokerage Solution: Formal Methods Meet Security in Cloud Federations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…One of the motivations for this tool is our project around a broker for the Cloud that takes into account user security requirements that can be expressed as first order relational logic formulas and that we checked using Alloy/Kodkod [25]. In order to increase the trust in this broker, we aim at formalizing all the hypothesis made on the system, and make sure that if the formal requirement given by the user contains no error and are added to the system, then conclusions about the security of the new state of the system can be drawn.…”
Section: Discussionmentioning
confidence: 99%
“…One of the motivations for this tool is our project around a broker for the Cloud that takes into account user security requirements that can be expressed as first order relational logic formulas and that we checked using Alloy/Kodkod [25]. In order to increase the trust in this broker, we aim at formalizing all the hypothesis made on the system, and make sure that if the formal requirement given by the user contains no error and are added to the system, then conclusions about the security of the new state of the system can be drawn.…”
Section: Discussionmentioning
confidence: 99%
“…Similarly the authors of [176] have proposed a security framework for cloud complexity management (agent) system [116], utilizing the Z/EVES theorem prover to analyse several cloud security properties within a NIST [45] cloud reference architecture. Also in the work [236] the authors have proposed a broker solution for automatically pairing cloud services with customers, while managing the cloud complexity. An important part of the broker is finding a service satisfying customers security requirements, defined in first order relational logic [133] using KODKOD finite model finder [248].…”
Section: Enterprisementioning
confidence: 99%
“…The work in [ 23 ] addresses existing cybersecurity issues in cloud environments by applying formal verification. The proposed solution defines security properties by addressing cyberattacks in online environments.…”
Section: Related Workmentioning
confidence: 99%
“… [ 32 ] X X X Real-world cloud system concept that can be used in analysis and implemented. [ 23 ] X X Additional cloud-related security issues in form of a greater challenge. [ 24 ] X System models to generate and execute model-based tests.…”
Section: Related Workmentioning
confidence: 99%