Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments - Service-Oriented and Cloud Computing Access content directly
Conference Papers Year : 2017

Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments

Abstract

By embracing cloud computing enterprises are able to boost their agility and productivity whilst realising significant cost savings. However, due to security and privacy concerns, many enterprises are reluctant to migrate their data and operations to the cloud. One way to alleviate these concerns is to devise access control policies that infuse suitable security controls into cloud services. Nevertheless, the complexity inherent in such policies, stemming from the dynamic nature of cloud environments, calls for a framework that provides assurances with respect to the effectiveness of the policies. In this respect, this work proposes a class of constraints, the so-called well-formedness constraints, that provide such assurances by empowering stakeholders to harness the attributes of the policies. Both the policies and the constraints are expressed ontologically hence enabling automated reasoning about the abidance of the policies with the constraints.
Fichier principal
Vignette du fichier
449571_1_En_6_Chapter.pdf (495.92 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01677625 , version 1 (08-01-2018)

Licence

Attribution

Identifiers

Cite

Simeon Veloudis, Iraklis Paraskakis, Christos Petsos. Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments. 6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.75-82, ⟨10.1007/978-3-319-67262-5_6⟩. ⟨hal-01677625⟩
37 View
47 Download

Altmetric

Share

Gmail Facebook X LinkedIn More