Filters








45 Hits in 3.9 sec

Secure web service federation management using tpm virtualisation

Srijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theo Dimitrakos
2007 Proceedings of the 2007 ACM workshop on Secure web services - SWS '07  
In this paper we propose a new Web Services (WS) framework for managing and controlling WS interactions in a federated environment, leveraging on platform virtualisation architecture and the functionalities  ...  Web Services and SOA provide interoperability and architectural baseline for flexible and dynamic cross-enterprise collaborations, where execution and use of the participating services contributes to the  ...  We leverage on our previous work on virtualised trusted computing platform for web services security [4] , and extend the model to provide secure and enforceable membership management and control of federated  ... 
doi:10.1145/1314418.1314430 dblp:conf/sws/NairDCD07 fatcat:mkzwv7lhbzcahk47li6jljzkwq

Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions

Ivan Djordjevic, Srijith K. Nair, Theo Dimitrakos
2007 IEEE International Conference on Web Services (ICWS 2007)  
and system virtualisation approaches.  ...  This paper describes a method for combining software resource level security features offered by Web Services technologies, with the hardware-based security mechanisms offered by Trusted Computing Platform  ...  This is particularly useful for security auditing and traceability of the creation and management of system partitions and TPM virtualisations.  ... 
doi:10.1109/icws.2007.188 dblp:conf/icws/DjordjevicND07 fatcat:xpb5auvd6vfr7ipham3ba6stgm

Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services [chapter]

Yuri Demchenko, Canh Ngo, Cees de Laat, Diego R. Lopez, Antonio Morales, Joan A. García-Espín
2012 Computer Communications and Networks  
In particular, this chapter discusses the design and use of a security token service for federated access control and security context management in the generically multi-domain and multi-provider cloud  ...  to allow security services synchronisation and their binding to the virtualisation platforms run-time environment.  ...  Acknowledgement This work is supported by the FP7 EU-funded project GEANT3 (FP7-ICT-238875) and the FP7 EU-funded integrated project the Generalised Architecture for Dynamic Infrastructure Services (GEYSERS  ... 
doi:10.1007/978-1-4471-4189-1_5 fatcat:ri2iagravjbpblkqzfhpceeof4

Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures

Canh Ngo, Peter Membrey, Yuri Demchenko, Cees de Laat
2012 2012 Seventh International Conference on Availability, Reliability and Security  
It uses authorization ticket as a security session management mechanism to solve the security context synchronization and exchange between multiple Cloud providers.  ...  These models should be supported by new security approaches for multi-provider, multi-tenant crossing security domains to create consistent and dynamically configurable security services for virtualised  ...  are wrapped by SOAP web service layers.  ... 
doi:10.1109/ares.2012.81 dblp:conf/IEEEares/NgoMDL12 fatcat:6azh4c5slfgkdbrzhqpxsvrp5e

Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment

Yuri Demchenko, Leon Gommans, Cees de Laat
2007 2007 International Symposium on Collaborative Technologies and Systems  
that can be used with the major service-oriented AuthZ framework.  ...  Solutions and implementation are proposed and discussed for the service/application authorisation session and security context management in multidomain applications based on the GAAA Authorisation Framework  ...  INTRODUCTION Grid and Web Services based resources and services virtualisation allows for effective sharing of advanced computing resources and unique equipment via creation of the Virtual Laboratories  ... 
doi:10.1109/cts.2007.4621738 dblp:conf/cts/DemchenkoGL07 fatcat:rtqekeim7rgkvlb6wrdnvru3ci

Cybersecurity threats in cloud computing

Julian Jang Jaccard
2013 Australian Journal of Telecommunications and the Digital Economy  
This paper aims to provide an overview of major potential risks to privacy and security in the cloud.  ...  There is a growing concern in federated identity management in the use of community cloud.  ...  The ongoing Web Services standardisation work in WS-federation (OASIS 2009) has tried to provide some help in this aspect.  ... 
doi:10.18080/ajtde.v1n1.128 fatcat:jcogbhos55d7hfmpqbqspq73jm

Cybersecurity threats in cloud computing

Julian Jang-Jaccard, Surya Nepal, Y Jay Guo
2013 Australian Journal of Telecommunications and the Digital Economy  
This paper aims to provide an overview of major potential risks to privacy and security in the cloud.  ...  Our focus in this article is to discuss the emerging threats to cloud services and present some potential future research directions. The rest of the article is structured as follows.  ...  There is a growing concern in federated identity management in the use of community cloud.  ... 
doi:10.7790/ajtde.v1n1.4 fatcat:7iu6hnuitjdw5mzdrl23ip4h5m

Defining Intercloud Security Framework And Architecture Components For Multi-Cloud Data Intensive Applications

Yuri Demchenko, Fatih Turkmen, Cees De Laat, Mathias Slawik
2017 Zenodo  
, security services lifecycle management.  ...  The paper refers to the security infrastructure development in the CYCLONE project that implements federated identify management, secure logging service, and multi-domain Attribute Based Access Control  ...  ICSF follows a federated security model and may use ICFF infrastructure services for federating identities and using federated trust services.  ... 
doi:10.5281/zenodo.1044392 fatcat:6xedvzt7tneoxgnyzugxvmagqy

Grid security: Next steps

Andrew Martin, Po-Wah Yau
2007 Information Security Technical Report  
and virtualisation, which help address the problems.  ...  Using some case studies and experience, we describe the existing Grid security models, explain why they represent shortcomings for some applications, and describe some emerging architectures, Trusted Computing  ...  While Grid computing can be used to leverage computation time, its other use is for the federation of data provided by different, often disparate, information services [48] .  ... 
doi:10.1016/j.istr.2007.05.009 fatcat:vghhkchby5elrbh6quwu2xmh3m

Re-thinking Grid Security Architecture

Yuri Demchenko, Cees de Laat, Oscar Koeroo, David Groep
2008 2008 IEEE Fourth International Conference on eScience  
The paper provides a short overview of the OGSA security services and other security solutions used in Grid middleware and operations practice.  ...  This paper analyses the security aspects of different types of Grids and a set of use cases that may require extended security functionality, such as dynamic security context management, and management  ...  Security policies are used to manage security services and can be a part of an application specific security service implementation.  ... 
doi:10.1109/escience.2008.53 dblp:conf/eScience/DemchenkoLKG08 fatcat:b6l3sodzzbbe5b2sgs2j4ofoja

CyberGuarder: A virtualization security assurance architecture for green cloud computing

Jianxin Li, Bo Li, Tianyu Wo, Chunming Hu, Jinpeng Huai, Lu Liu, K.P. Lam
2012 Future generations computer systems  
Thirdly, a security service providing policy based trust management is proposed to facilitate access control to the resources pool and a trust federation mechanism to support/optimise task privacy and  ...  In particular, CyberGuarder provides three different kinds of services; namely, a virtual machine security service, a virtual network security service and a policy based trust management service.  ...  Next, we test VMInsight's capability of process monitoring using the Apache Web server and some commonly used applications.  ... 
doi:10.1016/j.future.2011.04.012 fatcat:aruwngb4prdlrdfavutbhjx6ei

Innovations for Grid Security from Trusted Computing [chapter]

Wenbo Mao, Andrew Martin, Hai Jin, Huanguo Zhang
2009 Lecture Notes in Computer Science  
We identify and discuss in this paper a number of innovations that the TC technology could offer for improving the Grid security.  ...  We consider that such a notion of integrity protection of resources naturally suits the security requirements for Grid computing or science collaborations.  ...  Nigel Edwards and Dirk Kuhlmann provided insights in the notion of secure virtualisation.  ... 
doi:10.1007/978-3-642-04904-0_18 fatcat:jya2cqcnefa75ktsccavu7vr6e

Innovations for Grid Security from Trusted Computing [chapter]

Wenbo Mao
2009 Lecture Notes in Computer Science  
We identify and discuss in this paper a number of innovations that the TC technology could offer for improving the Grid security.  ...  We consider that such a notion of integrity protection of resources naturally suits the security requirements for Grid computing or science collaborations.  ...  Nigel Edwards and Dirk Kuhlmann provided insights in the notion of secure virtualisation.  ... 
doi:10.1007/978-3-642-04904-0_19 fatcat:h7v2p5bkd5c2viavabemvrcez4

Virtual machine security

Arif Khan
2017 International Journal of Information and Computer Security  
Proper techniques to construct a novel defense mechanism for virtualisation have also been discussed. We need to follow some appropriate habits for deploying and using VM.  ...  In the present article we have described the security of the virtual machine (VM). The virtual environment is not fully risk-proof.  ...  Like other services, IaaS is also scalable, services by IaaS are provided by web browser and payment is made as per use.  ... 
doi:10.1504/ijics.2017.082839 fatcat:dofaglbmijf3dkoypcyhf3t3ym

Trusted computing enhanced user authentication with OpenID and trustworthy user interface

Andreas Leicher, Andreas U. Schmidt, Yogendra Shah, Inhyok Cha
2011 International Journal of Internet Technology and Secured Transactions  
We build on the security provided by the TPM to create a trusted variant of identity management systems based on the popular OpenID protocol.  ...  Trusted computing, used as a security technology, can establish trust between multiple parties.  ...  Meyerstein, for many useful discussions and comments.  ... 
doi:10.1504/ijitst.2011.043133 fatcat:q3ylrwkjnbedbkix6h5phnhltq
« Previous Showing results 1 — 15 out of 45 results