Implementation of Cloud-based Access Control and Resource Management System

This article considers the central problems of access control security and resource management in an enterprise- based private cloud. To gain real solutions, we design and implement TAAS system that enforces authorized access to protected data and services as well as provides fine-grained resource management, in support of secure and effective cloud computing. The key components with involved novelties in this work include but not limited to, a light-weight hybrid authentication protocol, a flexible powerful authorization framework, and an efficient resource organization model.

[1]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[2]  Ye Wu,et al.  Causality and Accountability , 2009, Formal Aspects in Security and Trust.

[3]  Andrew W. Appel,et al.  Proof-carrying authentication , 1999, CCS '99.

[4]  Butler W. Lampson Practical Principles for Computer Security , 2007 .

[6]  Butler W. Lampson,et al.  Authentication in distributed systems , 1993 .

[7]  Ye Wu,et al.  Security Correctness for Secure Nested Transactions - Extended Abstract , 2013, TGC.

[8]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).