2010
DOI: 10.1007/978-3-642-11733-6_3
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: Abstract. The emergence of grid and cloud computing systems has introduced new security concepts, so it requires new access control approaches. Traditional systems engineering processes can be enriched with helper approaches that can facilitate the definition of access control requirements in such complex environments. Looking towards a holistic approach on the definition of access control requirements, we propose a four-layer conceptual categorization. In addition, an example is given so that to demonstrate t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 16 publications
(17 reference statements)
0
15
0
Order By: Relevance
“…Figure 2 illustrates the proposed methodology in a system development process that consists of the stages of requirements engineering, systems' design and verification. We propose for the stage of requirements engineering to apply the Conceptual Categorization (CC) [3] and during verification to apply model checking techniques. CC is capable of tailoring the requirements engineering through a re-engineering process.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 4 more Smart Citations
“…Figure 2 illustrates the proposed methodology in a system development process that consists of the stages of requirements engineering, systems' design and verification. We propose for the stage of requirements engineering to apply the Conceptual Categorization (CC) [3] and during verification to apply model checking techniques. CC is capable of tailoring the requirements engineering through a re-engineering process.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Concerning the requirements engineering stage, we choose to apply the CC that is proposed in [3], which is a layered approach for the definition and evaluation of security requirements for modern collaborative systems, as the Cloud. In brief, CC is based on four abstraction layers.…”
Section: Access Control Requirementsmentioning
confidence: 99%
See 3 more Smart Citations