Implementing Chinese Wall security model for cloud-based services
暂无分享,去创建一个
[1] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[2] Abhishek Majumder,et al. Taxonomy and Classification of Access Control Models for Cloud Environments , 2014 .
[3] R. Milner,et al. Bigraphical Reactive Systems , 2001, CONCUR.
[4] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[5] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[6] Chi-Lun Liu. Cloud service access control system based on ontologies , 2014, Adv. Eng. Softw..
[7] Zaigham Mahmood. Continued Rise of the Cloud: Advances and Trends in Cloud Computing , 2014 .
[8] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[9] Faiza Belala,et al. Model-Checking Cloud Systems Using BigMC , 2014, VECoS.
[10] Robin Milner,et al. Bigraphical reactive systems: basic theory , 2001 .