2010
DOI: 10.1007/978-3-642-16955-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing End-to-End Application Security in the Cloud

Abstract: Security engineering must be integrated with all stages of application specification and development to be effective. Doing this properly is increasingly critical as organisations rush to offload their software services to cloud providers. Service-level agreements (SLAs) with these providers currently focus on performance-oriented parameters, which runs the risk of exacerbating an impedance mismatch with the security middleware. Not only do we want cloud providers to isolate each of their clients from others, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Role Based Access Control (RBAC) is a scheme that restricts unauthorized users to access a system. It offers a satisfactory level of safety & security for authorized mHealth users who accessing EHR system resources & medical records through a set of rules & policies put into effect for patients, doctors or any other personnel in the form of login & password [26]. In [27] Yu-Yi Chen et al proposed an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.…”
Section: Secure Cloud Storagementioning
confidence: 99%
“…Role Based Access Control (RBAC) is a scheme that restricts unauthorized users to access a system. It offers a satisfactory level of safety & security for authorized mHealth users who accessing EHR system resources & medical records through a set of rules & policies put into effect for patients, doctors or any other personnel in the form of login & password [26]. In [27] Yu-Yi Chen et al proposed an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.…”
Section: Secure Cloud Storagementioning
confidence: 99%
“…Next to access control, policies have been applied for a large variety of goals in the domain of middleware. Amongst others, Bacon et al [4] employ policies for information flow control in multidomain applications, Wun and Jacobson [25] for managing content-based publish/subscribe middleware and Kumar et al [15] for describing self-management behavior. The common denominator of all this work is that policies are used to separate semantics from enforcement and describe the semantics declaratively.…”
Section: Related Workmentioning
confidence: 99%
“…Secure operation requires that applications [14] and services be capable of supporting a variety of security functionality, such as authentication, authorization, credential conversion, auditing, and delegation. Interaction between services requires having a range of security requirements and mechanisms.…”
Section: Proposed Model For Clloud Security Management 41 Overviewmentioning
confidence: 99%