Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4 Hits in 5.8 sec

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

M Venkatesu, G Anjan Babu
unpublished
using formal verification.  ...  S haring of resources on the cloud can be achieved on a large scale since it is cost effective and location independent.  ...  relations into cross-tenant access control models which can be enforced by the multi-tenant authorization as a service (MTAaaS) platform in the cloud.  ... 
fatcat:5dytewt5gbbqlakkbc2ihft7ce

Resource Handling In Cloud Computing Environment Using Cross Tenant Access Control (Ctac) Model

D. Dhanya, R. S. Akhila, Aparna Jose, R. P. Bincy Raj
2018 Zenodo  
The permission activation and delegation mechanism among different tenants are demonstrated using four modules tenant management, CRMS (Cloud Resource Mediation Service), TAC (Tenant Access Control) and  ...  As cloud computing becomes more flexible and effective in terms of economy, data owners are motivated to outsource their complex data system from local size to commercial public cloud.  ...  For example, users who belong to an intra-tenant cloud can allow other cross-tenant users to activate a permission in their tenant via the CRMS and also presented a formal model CTAC with four modules  ... 
doi:10.5281/zenodo.1320414 fatcat:a5xsfx7aordftkvqx6m4xudaui

A Novel Internet of Things-centric Framework to Mine Malicious Frequent Patterns

Nighat Usman, Qaisar Javaid, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saeeda Usman, Asma Sher, Manzoor Ilahi, Masoom Alam
2017 IEEE Access  
patterns for identifying misuse and detecting anomalies without incurring high computational costs (e.g., due to generation and analysis of unnecessary patterns and gap creation between patterns).  ...  We then present a framework for mining malicious frequent patterns in an IoT deployment, prior to evaluating the utility of the proposed framework using data from a Pakistan-based organization. 8 9 INDEX  ...  Tabbasum, and 591 M. Alam, ''A cross tenant access control (CTAC) model for cloud com-592 puting: Formal specification and verification,'' IEEE Trans. Inf.  ... 
doi:10.1109/access.2017.2690456 fatcat:augzzvs4cfat5bhwsjba5bxmcy

Fiscal Year 2015 Budget Request

unpublished
visa and border crossing card holders, and process more than 300 million travelers entering the U.S. by land, sea, and air.  ...  The cyber threat we face is growing and poses a greater concern to a critical infrastructure that is becoming increasingly interdependent.  ...  At a Glance Senior Leadership: Lori L.  ... 
fatcat:w6hvrdgv3ng33jshbynhvdufly