A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure web service federation management using tpm virtualisation
2007
Proceedings of the 2007 ACM workshop on Secure web services - SWS '07
In this paper we propose a new Web Services (WS) framework for managing and controlling WS interactions in a federated environment, leveraging on platform virtualisation architecture and the functionalities ...
Web Services and SOA provide interoperability and architectural baseline for flexible and dynamic cross-enterprise collaborations, where execution and use of the participating services contributes to the ...
We leverage on our previous work on virtualised trusted computing platform for web services security [4] , and extend the model to provide secure and enforceable membership management and control of federated ...
doi:10.1145/1314418.1314430
dblp:conf/sws/NairDCD07
fatcat:mkzwv7lhbzcahk47li6jljzkwq
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
2007
IEEE International Conference on Web Services (ICWS 2007)
and system virtualisation approaches. ...
This paper describes a method for combining software resource level security features offered by Web Services technologies, with the hardware-based security mechanisms offered by Trusted Computing Platform ...
This is particularly useful for security auditing and traceability of the creation and management of system partitions and TPM virtualisations. ...
doi:10.1109/icws.2007.188
dblp:conf/icws/DjordjevicND07
fatcat:xpb5auvd6vfr7ipham3ba6stgm
Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services
[chapter]
2012
Computer Communications and Networks
In particular, this chapter discusses the design and use of a security token service for federated access control and security context management in the generically multi-domain and multi-provider cloud ...
to allow security services synchronisation and their binding to the virtualisation platforms run-time environment. ...
Acknowledgement This work is supported by the FP7 EU-funded project GEANT3 (FP7-ICT-238875) and the FP7 EU-funded integrated project the Generalised Architecture for Dynamic Infrastructure Services (GEYSERS ...
doi:10.1007/978-1-4471-4189-1_5
fatcat:ri2iagravjbpblkqzfhpceeof4
Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures
2012
2012 Seventh International Conference on Availability, Reliability and Security
It uses authorization ticket as a security session management mechanism to solve the security context synchronization and exchange between multiple Cloud providers. ...
These models should be supported by new security approaches for multi-provider, multi-tenant crossing security domains to create consistent and dynamically configurable security services for virtualised ...
are wrapped by SOAP web service layers. ...
doi:10.1109/ares.2012.81
dblp:conf/IEEEares/NgoMDL12
fatcat:6azh4c5slfgkdbrzhqpxsvrp5e
Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment
2007
2007 International Symposium on Collaborative Technologies and Systems
that can be used with the major service-oriented AuthZ framework. ...
Solutions and implementation are proposed and discussed for the service/application authorisation session and security context management in multidomain applications based on the GAAA Authorisation Framework ...
INTRODUCTION Grid and Web Services based resources and services virtualisation allows for effective sharing of advanced computing resources and unique equipment via creation of the Virtual Laboratories ...
doi:10.1109/cts.2007.4621738
dblp:conf/cts/DemchenkoGL07
fatcat:rtqekeim7rgkvlb6wrdnvru3ci
Cybersecurity threats in cloud computing
2013
Australian Journal of Telecommunications and the Digital Economy
This paper aims to provide an overview of major potential risks to privacy and security in the cloud. ...
There is a growing concern in federated identity management in the use of community cloud. ...
The ongoing Web Services standardisation work in WS-federation (OASIS 2009) has tried to provide some help in this aspect. ...
doi:10.18080/ajtde.v1n1.128
fatcat:jcogbhos55d7hfmpqbqspq73jm
Cybersecurity threats in cloud computing
2013
Australian Journal of Telecommunications and the Digital Economy
This paper aims to provide an overview of major potential risks to privacy and security in the cloud. ...
Our focus in this article is to discuss the emerging threats to cloud services and present some potential future research directions. The rest of the article is structured as follows. ...
There is a growing concern in federated identity management in the use of community cloud. ...
doi:10.7790/ajtde.v1n1.4
fatcat:7iu6hnuitjdw5mzdrl23ip4h5m
Defining Intercloud Security Framework And Architecture Components For Multi-Cloud Data Intensive Applications
2017
Zenodo
, security services lifecycle management. ...
The paper refers to the security infrastructure development in the CYCLONE project that implements federated identify management, secure logging service, and multi-domain Attribute Based Access Control ...
ICSF follows a federated security model and may use ICFF infrastructure services for federating identities and using federated trust services. ...
doi:10.5281/zenodo.1044392
fatcat:6xedvzt7tneoxgnyzugxvmagqy
Grid security: Next steps
2007
Information Security Technical Report
and virtualisation, which help address the problems. ...
Using some case studies and experience, we describe the existing Grid security models, explain why they represent shortcomings for some applications, and describe some emerging architectures, Trusted Computing ...
While Grid computing can be used to leverage computation time, its other use is for the federation of data provided by different, often disparate, information services [48] . ...
doi:10.1016/j.istr.2007.05.009
fatcat:vghhkchby5elrbh6quwu2xmh3m
Re-thinking Grid Security Architecture
2008
2008 IEEE Fourth International Conference on eScience
The paper provides a short overview of the OGSA security services and other security solutions used in Grid middleware and operations practice. ...
This paper analyses the security aspects of different types of Grids and a set of use cases that may require extended security functionality, such as dynamic security context management, and management ...
Security policies are used to manage security services and can be a part of an application specific security service implementation. ...
doi:10.1109/escience.2008.53
dblp:conf/eScience/DemchenkoLKG08
fatcat:b6l3sodzzbbe5b2sgs2j4ofoja
CyberGuarder: A virtualization security assurance architecture for green cloud computing
2012
Future generations computer systems
Thirdly, a security service providing policy based trust management is proposed to facilitate access control to the resources pool and a trust federation mechanism to support/optimise task privacy and ...
In particular, CyberGuarder provides three different kinds of services; namely, a virtual machine security service, a virtual network security service and a policy based trust management service. ...
Next, we test VMInsight's capability of process monitoring using the Apache Web server and some commonly used applications. ...
doi:10.1016/j.future.2011.04.012
fatcat:aruwngb4prdlrdfavutbhjx6ei
Innovations for Grid Security from Trusted Computing
[chapter]
2009
Lecture Notes in Computer Science
We identify and discuss in this paper a number of innovations that the TC technology could offer for improving the Grid security. ...
We consider that such a notion of integrity protection of resources naturally suits the security requirements for Grid computing or science collaborations. ...
Nigel Edwards and Dirk Kuhlmann provided insights in the notion of secure virtualisation. ...
doi:10.1007/978-3-642-04904-0_18
fatcat:jya2cqcnefa75ktsccavu7vr6e
Innovations for Grid Security from Trusted Computing
[chapter]
2009
Lecture Notes in Computer Science
We identify and discuss in this paper a number of innovations that the TC technology could offer for improving the Grid security. ...
We consider that such a notion of integrity protection of resources naturally suits the security requirements for Grid computing or science collaborations. ...
Nigel Edwards and Dirk Kuhlmann provided insights in the notion of secure virtualisation. ...
doi:10.1007/978-3-642-04904-0_19
fatcat:h7v2p5bkd5c2viavabemvrcez4
Virtual machine security
2017
International Journal of Information and Computer Security
Proper techniques to construct a novel defense mechanism for virtualisation have also been discussed. We need to follow some appropriate habits for deploying and using VM. ...
In the present article we have described the security of the virtual machine (VM). The virtual environment is not fully risk-proof. ...
Like other services, IaaS is also scalable, services by IaaS are provided by web browser and payment is made as per use. ...
doi:10.1504/ijics.2017.082839
fatcat:dofaglbmijf3dkoypcyhf3t3ym
Trusted computing enhanced user authentication with OpenID and trustworthy user interface
2011
International Journal of Internet Technology and Secured Transactions
We build on the security provided by the TPM to create a trusted variant of identity management systems based on the popular OpenID protocol. ...
Trusted computing, used as a security technology, can establish trust between multiple parties. ...
Meyerstein, for many useful discussions and comments. ...
doi:10.1504/ijitst.2011.043133
fatcat:q3ylrwkjnbedbkix6h5phnhltq
« Previous
Showing results 1 — 15 out of 45 results