Search
Now showing items 1831-1840 of 1894
Multi-cloud distribution of virtual functions and dynamic service deployment: OpenADN perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Network Function Virtualization (NFV) and Service Chaining (SC) are novel service deployment approaches in the contemporary cloud environments for increased flexibility and cost efficiency to the Application Service Providers ...
Identifying contextual properties of software architecture in cloud computing
(
IEEE
, 2011 , Conference Paper)
This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Constraint-enhanced role engineering via answer set programming
(
Association for Computing Machinery
, 2012 , Conference Paper)
Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
Compliance checking for usage-constrained credentials in trust negotiation systems
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
Traceability for adaptive information security in the cloud
(
IEEE Computer Society
, 2014 , Conference Paper)
One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...
Profile-based security assurances for service software
(
Springer Verlag
, 2011 , Conference Paper)
In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...