Access control as a service for the Cloud
Tóm tắt
Từ khóa
Tài liệu tham khảo
PwC: Global State of Information Security Survey (2012). PwC: Global State of Information Security Survey (2012).
Subashini S, Kavitha V: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 2011, 34(1):1–11. 10.1016/j.jnca.2010.07.006
Gorniak S (ed) (2010) Priorities for research on current and emerging network trends. ENISA. . https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/procent
Catteddu D, Hogben G (eds) (2009) Cloud Computing Benefits, risks and recommendations for information security. ENISA. . https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Cloud Security Alliance (2013) The Notorious Nine Cloud Computing Top Threats in 2013. . https://cloudsecurityalliance.org/
Armando A, Carbone R, Compagna L, Cuellar J, Tobarra L: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. In Proc. of the 6th ACM Workshop on Formal Methods in Security Engineering. ACM, New York, NY; 2008:1–10. 10.1145/1456396.1456397
Somorovsky J, Mayer A, Schwenk J, Kampmann M, Jensen M: On breaking SAML: Be whoever you want to be. In Proc. of the 21st USENIX Security Symposium. USENIX Association, Berkeley, CA; 2012:21–21.
Fotiou N, Machas A, Polyzos GC, Xylomenos G: Access control delegation for the cloud. In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference On. IEEE, Canada; 2014:13–18. 10.1109/INFCOMW.2014.6849161
Wang G, Liu Q, Wu J: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM Conference on Computer and Communications Security. CCS ’10. ACM, New York, NY, USA; 2010:735–737. 10.1145/1866307.1866414
Zhou L, Varadharajan V, Hitchens M (2011) Enforcing role-based access control for secure data storage in the cloud. Comput J.doi:10.1093/comjnl/bxr080, . http://comjnl.oxfordjournals.org/content/early/2011/09/02/comjnl.bxr080.abstract
Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y: Fine-grained data access control systems with user accountability in cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference On. IEEE Computer Society, Washington, DC; 2010:89–96. 10.1109/CloudCom.2010.44
Yu S, Wang C, Ren K, Lou W: Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE. IEEE Press, Piscataway, NJ; 2010:1–9.
OASIS (2013) eXtensible Access Control Markup Language (XACML) Version 3.0.22. . http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-en.html
Goyal V, Pandey O, Sahai A, Waters B: Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS ’06. ACM, New York, NY, USA; 2006:89–98.
Recordon D, Reed D: OpenID 2.0: a platform for user-centric identity management. In Proc. of the 2nd ACM Workshop on Digital Identity Management. ACM, New York, NY; 2006:11–16. 10.1145/1179529.1179532
Hardt D (ed) (2012) The OAuth 2.0 authorization framework. RFC 6749. . https://tools.ietf.org/html/rfc6749
Nunez D, Agudo I, Lopez J: Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services. In Proc of the IEEE 4th International Conference on Cloud Computing Technology and Science. IEEE Computer Society, Washington, DC, USA; 2012.
Khan RH, Ylitalo J, Ahmed AS (2011) OpenID authentication as a service in OpenStack In: Proc. of the 7th International Conference on Information Assurance and Security, 372–377.. IEEE. (doi://10.1109/ISIAS.2011. 6122782).
Yavatkar R, Pendarakis D, Guerin R (2000) A framework for policy-based admission control. RFC 2753. . https://tools.ietf.org/html/rfc2753
Durham D (ed) (2000) The COPS (Common Open Policy Service) Protocol. RFC 2748. . https://tools.ietf.org/html/rfc2748
Cantor S, Kemp J, Philpott R, Maler E (eds) (2005) Assertions and protocols for the OASIS Security Assertion Markup Language (SAML) v2.0. OASIS. . https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf
Openstack homepage. . last accessed 27 Apr. 2015. http://www.openstack.org/
Google Drive homepage. , last accessed 27 Apr. 2015. https://drive.google.com
Google Keyczar homepage. , last accessed 27 Apr. 2015. https://github.com/google/keyczar
Google App Engine homepage. , last accessed 27 Apr. 2015. https://developers.google.com/appengine/
Wang R, Chen S, Wang X: Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In Proc. of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, USA; 2012:365–379.