49,250 Hits in 5.2 sec

A Cloud Accountability Policy Representation Framework

Walid Benghabrit, Hervé Grall, Jean-Claude Royer, Mohamed Sellami, Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Anderson Santana de Oliveira, Karin Bernsmed
2014 Proceedings of the 4th International Conference on Cloud Computing and Services Science  
In this paper, we propose a framework for the representation of cloud accountability policies.  ...  This framework comes with two novel accountability policy languages; an abstract one, which is devoted for the representation of preferences/obligations in an human readable fashion, a concrete one for  ...  ACKNOWLEDGEMENTS This work was funded by the EU's 7th framework A4Cloud project.  ... 
doi:10.5220/0004949104890498 dblp:conf/closer/BenghabritGRSAEOOB14 fatcat:5o76y74gzngovhxw5htchyc6qu

Cloud Service Brokerage: Strengthening Service Resilience in Cloud-Based Virtual Enterprises [chapter]

Simeon Veloudis, Iraklis Paraskakis, Christos Petsos
2015 IFIP Advances in Information and Communication Technology  
By relying on an ontology-based representation of policies and services, SC 3 achieves a proper separation of concerns between policy definition and policy enforcement.  ...  This effectively enables SC 3 to perform policy evaluation in a manner generic and agnostic to the underlying cloud delivery platform utilised by a cloud-based VE.  ...  This research is funded by the EU 7th Framework Programme under the Broker@Cloud project (, grant agreement n°328392.  ... 
doi:10.1007/978-3-319-24141-8_11 fatcat:kbthp73wafb2veyr56xkc2kinq

User-Centered Security Management Of Api-Based Data Integration Workflows

Bojan Suzic
2017 Zenodo  
Our contribution is examined on a basis of the focused prototype that allows proxy-based integration with existing systems and web authorization protocols.  ...  of entire business processes to the cloud.  ...  In this scenario, we place a transparent proxy between clients and cloud service, with the purpose to serve as a second policy enforcement layer.  ... 
doi:10.5281/zenodo.1095756 fatcat:v4ca6qqnlvelbeeeinist7vama

Towards HIPAA-Compliant Healthcare Systems in Cloud Computing

Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
2012 International Journal of Computational Models and Algorithms in Medicine  
and Accountability Act (HIPAA).  ...  comply with various authorization policies from these data providers.  ...  The reasons why we introduce a layer of generic policy representation instead of directly transforming policies into the logical representation in our framework are as follows: First, the generic policy  ... 
doi:10.4018/jcmam.2012040101 fatcat:52ffqck7m5eylbfttvhqc4t3iu

Semantic-based policy management for cloud computing environments

Hassan Takabi, James B.D. Joshi
2012 International Journal of Cloud Computing  
Cloud computing environments do not allow use of a single access control mechanism, single policy language or single policy management tool for various cloud services.  ...  In this paper, we introduce a semantic-based policy management framework that is designed to give users a unified control point for managing policies that control access to their data no matter where the  ...  In a policy management system, access rules are specified based on representations of concepts and policy rules and these representations should be able to make policy-based authorisation decisions.  ... 
doi:10.1504/ijcc.2012.046717 fatcat:jvnrlakt3rhzzp2iho5xi6frye

Semantics-Enabled Policies for Information Sharing and Protection in the Cloud [chapter]

Yuh-Jong Hu, Win-Nan Wu, Jiun-Jan Yang
2011 Lecture Notes in Computer Science  
The emerging challenges of legalizing semanticsenabled policies for laws in the cloud include mitigating the gap between semantics-enabled policy and laws to avoid any ambiguity in the policy representation  ...  The semantics-enabled policies of information sharing and protection are represented as a combination of ontologies and rules to capture the concept of security and privacy laws.  ...  The important design issues related to semantics-enabled formal policies, including policy representation, policy compliance, policy framework, and policy deployment are explained in Section 3.  ... 
doi:10.1007/978-3-642-24704-0_24 fatcat:kemfdz2arvfvdfplay2pal5zem

Geo-graphical Representation for Future Challenges in e.Education

Agata Lo Tauro
2016 GEOmedia  
This is a work in progress.  ...  Environmental analysis will be given the floor to provide the feedback on the experience with geomatic applications, and their needs under a pluri-disciplinary approach.  ...  This is a work in progress.  ... 
doaj:99faccd594714bd49cf83dc6e584b0ea fatcat:p6wnrchfsnewbcfh6gtykbyy6i

A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces

Sheikh Mahbub Habib, Vijay Varadharajan, Max Muhlhauser
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
As a consequence, the Cloud Security Alliance (CSA) has formulated a self-assessment framework for cloud providers to publish their cloud platform's security controls and capabilities.  ...  This framework enables consumers to select a cloud service based on the capabilities and controls published by the providers.  ...  Taking these problems into account the Cloud Security Alliance (CSA) has designed a self-assessment questionnaire framework, i.e., CAIQ (Consensus Assessments Initiative Questionnaire) [1] as a part  ... 
doi:10.1109/trustcom.2013.58 dblp:conf/trustcom/HabibVM13 fatcat:wycejgudc5bt5bciwi3y5p4iki

Accessing multiple clouds with cloudmesh

Gregor von Laszewski, Fugang Wang, Hyungro Lee, Heng Chen, Geoffrey C. Fox
2014 Proceedings of the 2014 ACM international workshop on Software-defined ecosystems - BigSystem '14  
Lastly, we discuss how to move such a multi-cloud environment forward by integrating clouds managed by the community or are offered as public clouds.  ...  This includes the introduction of a mutual trust agreement on a user and project basis. We have developed a number of components that support the creation of such a multi-cloud environment.  ...  Figure 4 : An example of a policy to establish a access public clouds as part of provider and user managed multi-clouds. Integration into a Provider Consortium Managed Multi-Cloud.  ... 
doi:10.1145/2609441.2609638 dblp:conf/hpdc/LaszewskiWLCF14 fatcat:o7g76hw6ebeuvj4cf23b6oxdfm

Object Rearrangement Using Learned Implicit Collision Functions [article]

Michael Danielczuk, Arsalan Mousavian, Clemens Eppner, Dieter Fox
2021 arXiv   pre-print
We leverage the learned collision model as part of a model predictive path integral (MPPI) policy in a tabletop rearrangement task and show that the policy can plan collision-free grasps and placements  ...  We train the model on a synthetic set of 1 million scene/object point cloud pairs and 2 billion collision queries.  ...  Point Cloud Surface Representations Another approach to point cloud collision detection is to derive a representation of the underlying surface and check collisions against that representation.  ... 
arXiv:2011.10726v2 fatcat:ctrdpy66kfblfketagfrcnjviy

Validating Policies for Dynamic and Heterogeneous Cloud Environments [chapter]

Simeon Veloudis, Iraklis Paraskakis, Christos Petsos
2016 IFIP Advances in Information and Communication Technology  
We believe that such a mechanism is a vital ingredient of any framework aspiring to provide policy-based quality assurance of cloud services.  ...  Validating the SLA Portion of a BP Two main methods are involved in the validation of the SLA portion of a BP: (i) a parsing method which constructs a programmatic representation of the framework described  ... 
doi:10.1007/978-3-319-45390-3_43 fatcat:nshbcbfuebfavp2bemspn3lcwi

Ontology Centric Access Control Mechanism for Enabling Data Protection in Cloud

M. Auxilia, K. Raja
2016 Indian Journal of Science and Technology  
Policies are expressed using languages and can be exchanged among organizations. Models are mathematical representations of policies to prove the performance of the system.  ...  When a property is defined as symmetric, say 'SupportOf ' and Account x , Account y are individuals, then we can infer that SupportOf(Account x ,Account y ) → SupportOf(Account y ,Account x ) Scenario  ... 
doi:10.17485/ijst/2016/v9i23/95148 fatcat:gapmkzomh5dyvdnkx3ghzwvely

Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography [chapter]

Nick Papanikolaou, Siani Pearson, Marco Casassa Mont
2011 Communications in Computer and Information Science  
[10] describe in detail a framework for extracting meaning from the structure of technical documents.  ...  Semantic Models and Representations Waterman [4] develops a simple table-based representation of particular laws.  ...  Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography 7  ... 
doi:10.1007/978-3-642-22365-5_20 fatcat:ospsjr5wofeireovbnvhkje2ee

Usage Management in Cloud Computing

Pramod A. Jamkhedkar, Christopher C. Lamb, Gregory L. Heileman
2011 2011 IEEE 4th International Conference on Cloud Computing  
Finally, a preliminary architecture for such a framework is proposed.  ...  It provides an analysis of features and challenges involved in deploying a usage management framework over a distributed cloud environment to enable automated and actionable interpretation, reasoning and  ...  A usage policy consists of restrictions over usage expressed in terms of context properties. A context provides a formal representation of the cloud environment within which a policy is interpreted.  ... 
doi:10.1109/cloud.2011.112 dblp:conf/IEEEcloud/JamkhedkarLH11 fatcat:7r5znn6n7nf5nbdkbohcxi5wlq

Identity and Access Management: High-level Conceptual Framework

Sanket Devlekar, Vidyavati Ramteke
2021 Revista GEINTEC  
This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that  ...  Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks.  ...  We launched IAMaaS as a platform that allows cloud service providers to provide IAM as a cloud service in the public cloud.  ... 
doi:10.47059/revistageintec.v11i4.2511 fatcat:2smglqwvdzgwxfui4jchgcaizq
« Previous Showing results 1 — 15 out of 49,250 results