Cloud identity management: A survey on privacy strategies
暂无分享,去创建一个
[1] Abdul Ghafoor Abbasi,et al. Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol , 2013, KES.
[2] Siani Pearson,et al. A client-based privacy manager for cloud computing , 2009, COMSWARE '09.
[3] Hyangjin Lee,et al. Criteria for Evaluating the Privacy Protection Level of Identity Management Services , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[4] Carla Merkle Westphall,et al. Environment, Services and Network Management for Green Clouds , 2012, CLEI Electron. J..
[5] Slim Trabelsi,et al. Sticky policies for data control in the cloud , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[6] Bu-Sung Lee,et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[7] T. Grance,et al. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .
[8] Vladimir Stantchev,et al. Special issue on exploiting semantic technologies with particularization on linked data over grid and cloud architectures , 2014, Future Gener. Comput. Syst..
[9] Daniel J. Solove,et al. Privacy Self-Management and the Consent Dilemma , 2012 .
[10] Carla Merkle Westphall,et al. A model for identity management with privacy in the cloud , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[11] Hanan El Bakkali,et al. An approach for privacy policies negotiation in mobile health-Cloud environments , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).
[12] Carla Merkle Westphall,et al. A framework and risk assessment approaches for risk-based access control in the cloud , 2016, J. Netw. Comput. Appl..
[13] Baochun Li,et al. Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud , 2014, IEEE Trans. Cloud Comput..
[14] Antonio F. Gómez-Skarmeta,et al. Semantic-aware multi-tenancy authorization system for cloud architectures , 2014, Future Gener. Comput. Syst..
[15] Carla Merkle Westphall,et al. Enhancing Privacy on Identity Providers , 2014, SECURWARE 2014.
[16] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[17] Fred B. Schneider,et al. Federated Identity Management Systems: A Privacy-Based Characterization , 2013, IEEE Security & Privacy.
[18] Carl E. Landwehr,et al. Computer security , 2001, International Journal of Information Security.
[19] Audun Jøsang,et al. A User-centric Federated Single Sign-on System , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[20] Bharat K. Bhargava,et al. An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[21] Pierangela Samarati,et al. Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project , 2010, J. Comput. Secur..
[22] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[23] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[24] Ron Poet,et al. Managing Dynamic Identity Federations using Security Assertion Markup Language , 2015, J. Theor. Appl. Electron. Commer. Res..
[25] Erik Wästlund,et al. Towards Usable Privacy Policy Display & Management for PrimeLife , 2012, Inf. Manag. Comput. Secur..
[26] Kamran Sartipi,et al. OpenID Connect as a security service in cloud-based medical imaging systems , 2016, Journal of medical imaging.
[27] Andrés Marín López,et al. Enhancing privacy and dynamic federation in IdM for consumer cloud computing , 2012, IEEE Transactions on Consumer Electronics.
[28] Seda Gürses,et al. Understanding the landscape of privacy technologies 1 , 2012 .
[29] Daniel J. Solove,et al. Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .
[30] Stéphane Betgé-Brezetz,et al. End-to-end privacy policy enforcement in cloud infrastructure , 2013, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet).
[31] A. Jøsang,et al. User Centric Identity Management , 2005 .
[32] Carla Merkle Westphall,et al. Towards Privacy in Identity Management Dynamic Federations , 2016 .
[33] Isaac Agudo,et al. BlindIdM: A privacy-preserving approach for identity management as a service , 2014, International Journal of Information Security.
[34] Jostein Jensen,et al. Federated Identity Management Challenges , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[35] Miguel Correia,et al. The Final Frontier: Confidentiality and Privacy in the Cloud , 2011, Computer.
[36] Carla Merkle Westphall,et al. Model for Cloud Computing Risk Analysis , 2015 .
[37] Antonio Puliafito,et al. Security and Cloud Computing: InterCloud Identity Management Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[38] Tao Zhang,et al. A Sticky Policy Framework for Big Data Security , 2015, 2015 IEEE First International Conference on Big Data Computing Service and Applications.
[39] William J. Buchanan,et al. Sticky policy enabled authenticated OOXML , 2016, 2016 SAI Computing Conference (SAI).
[40] Marit Hansen,et al. Privacy and Identity Management , 2008, IEEE Security & Privacy.
[41] Roberto Baldoni. Federated Identity Management systems in e-government: the case of Italy , 2012, Electron. Gov. an Int. J..
[42] David W. Chadwick,et al. A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..
[43] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[44] Siani Pearson,et al. Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.
[45] Carla Merkle Westphall,et al. Privacy-preserving identity federations in the cloud: a proof of concept , 2014, Int. J. Secur. Networks.
[46] Félix Gómez Mármol,et al. To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management , 2014, Wirel. Pers. Commun..
[47] Sabrina De Capitani di Vimercati,et al. Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[48] Noboru Sonehara,et al. User-controlled Privacy Protection with Attribute-filter Mechanism for a Federated SSO Environment Using Shibboleth , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[49] Yan Zhao,et al. Providing privacy preserving in cloud computing , 2009, 2009 International Conference on Test and Measurement.
[50] Douglas M. Blough,et al. Distributed Enforcement of Sticky Policies with Flexible Trust , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[51] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[52] José M. del Álamo,et al. Privacy Engineering: Shaping an Emerging Field of Research and Practice , 2016, IEEE Security & Privacy.
[53] Elisa Bertino,et al. Identity Management: Concepts, Technologies, and Systems , 2010 .
[54] Martin Knahl,et al. An Autonomous Agent Based Incident Detection System for Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[55] Jan Camenisch,et al. Concepts and languages for privacy-preserving attribute-based authentication , 2014, J. Inf. Secur. Appl..
[56] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[57] Carla Merkle Westphall,et al. An Approach to IdM with Privacy in the Cloud , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[58] Alberto Leon-Garcia,et al. Identity access management for Multi-tier cloud infrastructures , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[59] Azeem Ahmad,et al. A Multi-token Authorization Strategy for Secure Mobile Cloud Computing , 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.