A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
unpublished
using formal verification. ...
S haring of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. ...
relations into cross-tenant access control models which can be enforced by the multi-tenant authorization as a service (MTAaaS) platform in the cloud. ...
fatcat:5dytewt5gbbqlakkbc2ihft7ce
Resource Handling In Cloud Computing Environment Using Cross Tenant Access Control (Ctac) Model
2018
Zenodo
The permission activation and delegation mechanism among different tenants are demonstrated using four modules tenant management, CRMS (Cloud Resource Mediation Service), TAC (Tenant Access Control) and ...
As cloud computing becomes more flexible and effective in terms of economy, data owners are motivated to outsource their complex data system from local size to commercial public cloud. ...
For example, users who belong to an intra-tenant cloud can allow other cross-tenant users to activate a permission in their tenant via the CRMS and also presented a formal model CTAC with four modules ...
doi:10.5281/zenodo.1320414
fatcat:a5xsfx7aordftkvqx6m4xudaui
A Novel Internet of Things-centric Framework to Mine Malicious Frequent Patterns
2017
IEEE Access
patterns for identifying misuse and detecting anomalies without incurring high computational costs (e.g., due to generation and analysis of unnecessary patterns and gap creation between patterns). ...
We then present a framework for mining malicious frequent patterns in an IoT deployment, prior to evaluating the utility of the proposed framework using data from a Pakistan-based organization. 8 9 INDEX ...
Tabbasum, and 591 M. Alam, ''A cross tenant access control (CTAC) model for cloud com-592 puting: Formal specification and verification,'' IEEE Trans. Inf. ...
doi:10.1109/access.2017.2690456
fatcat:augzzvs4cfat5bhwsjba5bxmcy
Fiscal Year 2015 Budget Request
unpublished
visa and border crossing card holders, and process more than 300 million travelers entering the U.S. by land, sea, and air. ...
The cyber threat we face is growing and poses a greater concern to a critical infrastructure that is becoming increasingly interdependent. ...
At a Glance Senior Leadership: Lori L. ...
fatcat:w6hvrdgv3ng33jshbynhvdufly