2013
DOI: 10.1007/978-3-642-37437-1_8
|View full text |Cite
|
Sign up to set email alerts
|

A Methodology for the Development and Verification of Access Control Systems in Cloud Computing

Abstract: Abstract. Cloud computing is an emergent technology that has generated significant interest in the marketplace and is forecasted for high growth. Moreover, Cloud computing has a great impact on different type of users from individual consumers and businesses to small and medium size (SMBs) and enterprise businesses. Although there are many benefits to adopting Cloud computing, there are significant barriers to adoption, viz. security and privacy. In this paper, we focus on carefully planning security aspects r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…As an example, Gouglidis and Mavridis (2013) proposed a methodology for the development and verification of access control systems in cloud computing. The authors verify the access control systems against organizational security requirements using techniques that are based on simple transition systems.…”
Section: Related Workmentioning
confidence: 99%
“…As an example, Gouglidis and Mavridis (2013) proposed a methodology for the development and verification of access control systems in cloud computing. The authors verify the access control systems against organizational security requirements using techniques that are based on simple transition systems.…”
Section: Related Workmentioning
confidence: 99%
“…The contributions of this dissertation are centred on the following topics: definition of a requirements engineering approach, the modeling of an AC model for use in modern collaborative systems, and a verification technique to verify the correctness of the defined model against security properties. All the aforementioned are placed in the context of a systems engineering methodology for an end-to-end development of AC models, as originally presented in (Gouglidis and Mavridis, 2013). In the remainder of this section, we present the contributions in more details.…”
Section: Research Areasmentioning
confidence: 99%
“…Our proposed RBAC model is illustrated in Mavridis, 2011, 2012a). The SE methodology is proposed in (Gouglidis and Mavridis, 2013), and lastly, our approach to the verification of security properties is modelled in (Gouglidis et al, 2013a,b). <xs:element name="Inter_Child_Role" type="xs:string" minOccurs="0" maxOccurs="1"/> </xs:sequence> <xs:sequence minOccurs="0" maxOccurs="unbounded"> <xs:element name="Intra_Parent_Role" type="xs:string" minOccurs="0" maxOccurs="1"/> </xs:sequence> <xs:sequence minOccurs="0" maxOccurs="unbounded"> <xs:element name="Intra_Child_Role" type="xs:string" minOccurs="0" maxOccurs="1"/> </xs:sequence> <xs:sequence minOccurs="0" maxOccurs="unbounded"> <xs:element name="SSD_Role" type="xs:string" minOccurs="0" maxOccurs="1"/> </xs:sequence> <xs:sequence minOccurs="0" maxOccurs="unbounded"> <xs:element name="DSD_Role" type="xs:string" minOccurs="0" maxOccurs="1"/> </xs:sequence> <xs:element name="SR_Cardinality" type="xs:unsignedLong" minOccurs="0" maxOccurs="1"/> <xs:element name="DR_Cardinality" type="xs:unsignedLong" minOccurs="0" maxOccurs="1"/> </xs:sequence> </xs:complexType> </xs:element> <xs:element name="Name"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="Inter_Parent_Role"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="Inter_Child_Role"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="Intra_Parent_Role"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="Intra_Child_Role"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="SSD_Role"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="DSD_Role"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="SR_Cardinality"> <xs:complexType mixed="true"/> </xs:element> <xs:element name="DR_Cardinality"> <xs:complexType mixed="true"/> < proposal is based on NIST's (National Institute of Standards and Technology) generic model checking technique and has been enriched with RBAC reasoning.…”
Section: Closing Remarksmentioning
confidence: 99%