Show simple item record

AuthorNhlabatsi, Armstrong
AuthorThun, Thein
AuthorKhan, Niamul
AuthorYu, Yijun
AuthorBandara, Arosha
AuthorKhan, Khaled
AuthorNuseibeh, Bashar
Available date2024-04-02T06:04:49Z
Publication Date2014
Publication NameIEEE International Conference on Cloud Computing, CLOUD
ResourceScopus
ISSN21596182
URIhttp://dx.doi.org/10.1109/CLOUD.2014.141
URIhttp://hdl.handle.net/10576/53792
AbstractOne of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a risk that security policies are violated. To minimize this risk, cloud applications need to be engineered to adapt their security policies to maintain satisfaction of security requirements despite changes in their usage context. We call such adaptation capability Adaptive Information Security. The paper argues that one of the prerequisites to adaptive information security is the use of traceability as a means to understanding the relationship between security requirements and security policies. Using an example, we motivate the need for improving traceability in the development of cloud applications.
Languageen
PublisherIEEE Computer Society
SubjectAdaptive Information Security
Cloud Applications
Context
Traceability
TitleTraceability for adaptive information security in the cloud
TypeConference Paper
Pagination958-959


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record