2011
DOI: 10.1007/s13174-011-0035-x
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Cloud computing has drawn much attention in recent years. One of its service models, called infrastructure as a service (IaaS), provides users with infrastructure services such as computation and data storage, heavily dependent upon virtualization techniques. Most of the current IaaS providers take the user-resource direct mapping approach for their business, where individual users are the only type of service consumer who can request and use virtualized resources as long as they pay for the usage. Therefore, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Roeckle et al [24] proposed to deduce roles by analyzing business processes. Shin et al [26] conducted a topdown role engineering by examining backward and forward information flows and employing unified modeling language. Neumann and Strembeck [22] discovered roles by aggregating permissions derived from analyzing usage scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Roeckle et al [24] proposed to deduce roles by analyzing business processes. Shin et al [26] conducted a topdown role engineering by examining backward and forward information flows and employing unified modeling language. Neumann and Strembeck [22] discovered roles by aggregating permissions derived from analyzing usage scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…ACaaS introduced role hierarchies, sessions, constraints and an administration model. Domain based access controls (dCloud) [24], [25] were proposed based on the original RBAC model. The general idea is to group related resources and users into a domain so that administration can be delegated to each domain.…”
Section: Fig 4: Amazon Web Service Access Controlmentioning
confidence: 99%
“…Organizations should not assume that because the system is hosted by a cloud provider that security is also handled externally. Current research on this topic includes solutions by Shin et al showing methods for authorization [12] and access control [13].…”
Section: B Protecting Against Cloud Exploitsmentioning
confidence: 99%