Platform as a service, 2015. ,
The cloud data center management solution, 2015. ,
The open hybrid cloud application platform by red hat, 2015. ,
The open source cloud computing software, 2015. ,
Managing access to electronic health records in a cloud computing environment, Journal of Information Sciences and Computing Technologies, vol.3, issue.2, pp.191-195, 2015. ,
Security in cloud computing: Opportunities and challenges, Information Sciences, vol.305, pp.357-383, 2015. ,
DOI : 10.1016/j.ins.2015.01.025
Collaboration-Based Cloud Computing Security Management Framework, 2011 IEEE 4th International Conference on Cloud Computing, pp.364-371, 2011. ,
DOI : 10.1109/CLOUD.2011.9
Toward Effective Access Control Using Attributes and Pseudoroles, 2014. ,
Computer security threat monitoring and surveillance, 1980. ,
Web services agreement specification (wsagreement ) In Open Grid Forum, p.216, 2007. ,
An abstract model for integrated intrusion detection and severity analysis for clouds, Cloud Computing Advancements in Design, Implementation, and Technologies, 2012. ,
Methods for access control: advances and limitations, 2001. ,
A Framework for SOFTWARE-AS-A-SERVICE Selection and Provisioning, International journal of Computer Networks & Communications, vol.5, issue.3, 2013. ,
DOI : 10.5121/ijcnc.2013.5314
Security SLAs for Federated Cloud Services, 2011 Sixth International Conference on Availability, Reliability and Security, pp.202-209, 2011. ,
DOI : 10.1109/ARES.2011.34
GEO-RBAC, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.29-37, 2005. ,
DOI : 10.1145/1063979.1063985
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334 ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Detecting Computer Worms in the Cloud, Open Problems in Network Security, pp.43-54, 2012. ,
DOI : 10.1007/978-3-642-27585-2_4
URL : https://hal.archives-ouvertes.fr/hal-01481505
Constraints specification in attribute based access control, Science, vol.2, issue.3, pp.131-144, 2013. ,
A framework for risk-aware role based access control, 2013 IEEE Conference on Communications and Network Security (CNS), pp.462-469, 2013. ,
DOI : 10.1109/CNS.2013.6682761
Towards an Attribute Based Constraints Specification Language, 2013 International Conference on Social Computing, pp.108-113, 2013. ,
DOI : 10.1109/SocialCom.2013.23
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service, Network and System Security, pp.41-53, 2014. ,
DOI : 10.1007/978-3-319-11698-3_4
A virtualization assurance language for isolation and deployment Automated verification of virtualized infrastructures, Policies for Distributed Systems and Networks (POLICY), 2011 IEEE International Symposium on Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pp.33-40, 2011. ,
An autonomous Cloud management system for in-depth security, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), pp.368-374, 2014. ,
DOI : 10.1109/CloudNet.2014.6969023
URL : https://hal.archives-ouvertes.fr/hal-01191746
Formalization and guaranty of system security properties: application to the detection of intrusions, 2007. ,
URL : https://hal.archives-ouvertes.fr/tel-00261613
A viewpoint-based approach for formal safety & security assessment of system architectures, 11th Workshop on Model-Driven Engineering, Verification and Validation, pp.39-48, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01070960
Toward a Multi-Tenancy Authorization System for Cloud Services, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.48-55, 2010. ,
DOI : 10.1109/MSP.2010.194
Contrail, Proceedings of the 1st European Workshop on Dependable Cloud Computing, EWDCC '12, 2011. ,
DOI : 10.1145/2365316.2365322
URL : https://hal.archives-ouvertes.fr/hal-00762967
A reference model for security level evaluation: Policy and fuzzy techniques, 2005. ,
DOI : 10.1109/itcc.2004.1286747
The importance of ABAC: Attribute-based access control to big data: Privacy and context, 2015. ,
TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006. ,
DOI : 10.1145/1133058.1133067
Using recommenders for Discretionary Access Control, Proceedings of the Web, 2009. ,
Risk-Aware Role-Based Access Control, Security and Trust Management, pp.140-156, 2012. ,
DOI : 10.1007/978-3-642-29963-6_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8754
NuSMV 2: An OpenSource Tool for Symbolic Model Checking, Computer Aided Verification, pp.359-364, 2002. ,
DOI : 10.1007/3-540-45657-0_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.8023
CSA Security, Trust & Assurance Registry (STAR). https://cloudsecurityalliance, 2016. ,
Consensus Assessments Initiative Questionnaire, 2011. ,
Security guidance for critical areas of focus in cloud computing v3.0, 2011. ,
https://cloudsecurityalliance.org/download/ cloud-adoption-practices-priorities-survey-report, 2015. ,
ABAC and RBAC: Scalable, Flexible, and Auditable Access Management, IT Professional, vol.15, issue.3, pp.14-16, 2013. ,
DOI : 10.1109/MITP.2013.37
Distributed Intrusion Detection in Clouds Using Mobile Agents, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, pp.175-180, 2009. ,
DOI : 10.1109/ADVCOMP.2009.34
SLA Perspective in Security Management for Cloud Computing, 2010 Sixth International Conference on Networking and Services, pp.212-217, 2010. ,
DOI : 10.1109/ICNS.2010.36
Survey and analysis of security parameters in cloud SLAs across the European public sector, 2011. ,
Or-BAC: un modele de contrôle d'acces basé sur les organisations. Cahiers francophones de la recherche en sécurité de l'information, pp.30-43, 2003. ,
Security issues in cloud environments: a survey, International Journal of Information Security, vol.28, issue.3, pp.113-170, 2014. ,
DOI : 10.1007/s10207-013-0208-7
Role-Based Access Control, 15th National Computer Security Conference, 1992. ,
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.4562
OPTIMIS: A holistic approach to cloud service provisioning, Future Generation Computer Systems, vol.28, issue.1, pp.66-77, 2012. ,
DOI : 10.1016/j.future.2011.05.022
URL : http://dspace.lib.ntua.gr/handle/123456789/33200
Comparison of model checking tools for information systems CloudSurfer-a cloud broker application for security concerns, Formal Methods and Software Engineering CLOSER, pp.581-596, 2010. ,
Negotiating and brokering cloud resources based on security level agreements, CLOSER, pp.533-541, 2013. ,
A virtual machine introspection based architecture for intrusion detection, NDSS, pp.191-206, 2003. ,
SMICloud: A Framework for Comparing and Ranking Cloud Services, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp.210-218, 2011. ,
DOI : 10.1109/UCC.2011.36
On the formal definition of separation-of-duty policies and their composition, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.172-183, 1998. ,
DOI : 10.1109/SECPRI.1998.674833
A Security Risk Assessment Model for Business Process Deployment in the Cloud, 2014 IEEE International Conference on Services Computing, pp.307-314 ,
DOI : 10.1109/SCC.2014.48
URL : https://hal.archives-ouvertes.fr/hal-01095874
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems, 2013 IEEE Seventh International Conference on Software Security and Reliability Companion, pp.35-44, 2013. ,
DOI : 10.1109/SERE-C.2013.25
Security policy verification for multi-domains in cloud systems, International Journal of Information Security, vol.8, issue.6, pp.97-111, 2014. ,
DOI : 10.1007/s10207-013-0205-x
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
The notorious nine: cloud computing top threats in 2013, 2013. ,
Access Control and Security Properties Requirements Specification for Clouds' SecLAs, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.723-729, 2013. ,
DOI : 10.1109/CloudCom.2013.133
URL : https://hal.archives-ouvertes.fr/hal-00920768
Cloud Resources Placement based on Functional and Non-functional Requirements, Proceedings of the 12th International Conference on Security and Cryptography, pp.20-22, 2015. ,
DOI : 10.5220/0005552503350342
URL : https://hal.archives-ouvertes.fr/hal-01158134
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source, Security and Communication Networks, vol.29, issue.1, pp.2185-2200, 2014. ,
DOI : 10.1002/sec.748
Managing Intrusion Detection as a Service in Cloud Networks, International Journal of Computer Applications, vol.41, issue.1, pp.35-40, 2012. ,
DOI : 10.5120/5508-7533
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
Mutant Apples: A Critical Examination of Cloud SLA Availability Definitions, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.379-386, 2013. ,
DOI : 10.1109/CloudCom.2013.56
The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5, 2004. ,
DOI : 10.1109/32.588521
Guide to attribute based access control (ABAC) definition and considerations, p.162, 2014. ,
DOI : 10.6028/NIST.SP.800-162
Towards multi-criteria cloud service selection, Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011. ,
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model, 2011 5th International Conference on Network and System Security, pp.113-120, 2011. ,
DOI : 10.1109/ICNSS.2011.6059967
Automating first-order relational logic, ACM SIGSOFT Software Engineering Notes, vol.25, issue.6, pp.130-139, 2000. ,
DOI : 10.1145/357474.355063
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.8507
Alloy: a lightweight object modelling notation, ACM Transactions on Software Engineering and Methodology, vol.11, issue.2, pp.256-290, 2002. ,
DOI : 10.1145/505145.505149
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4127
Software Abstractions: logic, language, and analysis, 2012. ,
A Framework for Realizing Security on Demand in Cloud Computing, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp.371-378, 2013. ,
DOI : 10.1109/CloudCom.2013.55
A Unified Attribute-Based Access Control Model Covering Detecting past and present intrusions through vulnerability-specific predicates, In ACM SIGOPS Operating Systems Review, vol.12, issue.39, pp.41-55, 2005. ,
Cloud4SOA: A Semantic-Interoperability PaaS Solution for Multi-cloud Platform Management and Portability, Service-Oriented and Cloud Computing, pp.64-78, 2013. ,
DOI : 10.1007/978-3-642-40651-5_6
Policy conflict analysis using free variable tableaux for access control in web services environments, Proceedings of the Policy Management for the Web Workshop at the 14th International World Wide Web Conference (WWW), pp.121-126, 2005. ,
NoHype, ACM SIGARCH Computer Architecture News, vol.38, issue.3, pp.350-361, 2010. ,
DOI : 10.1145/1816038.1816010
A Novel Access Control Model for Securing Cloud API. on Networking and Advanced Systems, p.67, 2015. ,
Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010. ,
DOI : 10.1109/MC.2010.155
Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing, Intelligent Information and Database Systems, pp.353-362, 2011. ,
DOI : 10.1109/3468.935051
Dynamic protection structures, Proceedings of the November 18-20, 1969, fall joint computer conference on, AFIPS '69 (Fall), pp.27-38, 1969. ,
DOI : 10.1145/1478559.1478563
Enhancing cloud security through access control models: A survey, International Journal of Computer Applications, vol.112, issue.7, p.2015 ,
Intrusion detection in virtual machine environments, Proceedings. 30th Euromicro Conference, 2004., pp.520-525, 2004. ,
DOI : 10.1109/EURMIC.2004.1333416
Multi-level intrusion detection system and log management in cloud computing, Advanced Communication Technology (ICACT) 13th International Conference on, pp.552-555, 2011. ,
CloudCmp, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.1-14, 2010. ,
DOI : 10.1145/1879141.1879143
CyberGuarder: A virtualization security assurance architecture for green cloud computing, Future Generation Computer Systems, vol.28, issue.2, pp.379-390, 2012. ,
DOI : 10.1016/j.future.2011.04.012
Finegrained data access control systems with user accountability in cloud computing, 2010 IEEE Second International Conference on, pp.89-96, 2010. ,
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings, Security and Privacy in Communication Networks, pp.89-106, 2010. ,
DOI : 10.1145/501978.501980
Analysis of antennas and scatterers with nonlinear loads, IEEE Transactions on Antennas and Propagation, vol.24, issue.2, pp.131-143, 2013. ,
DOI : 10.1109/TAP.1976.1141328
A refined RBAC model for cloud computing, Computer and Information Science (ICIS) 2012 IEEE/ACIS 11th International Conference on, pp.43-48, 2012. ,
Similarity Measure for Security Policies in Service Provider Selection, Information Systems Security, pp.227-242, 2015. ,
DOI : 10.1007/978-3-319-26961-0_14
URL : https://hal.archives-ouvertes.fr/hal-01392794
Ontology-based Negotiation of security requirements in cloud, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp.192-197, 2012. ,
DOI : 10.1109/CASoN.2012.6412401
NIST cloud computing reference architecture, NIST special publication, vol.500, p.292, 2011. ,
DOI : 10.6028/NIST.SP.500-292
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks, 2010 39th International Conference on Parallel Processing Workshops, pp.280-284, 2010. ,
DOI : 10.1109/ICPPW.2010.46
Secure virtualization for cloud computing, Journal of Network and Computer Applications, vol.34, issue.4, pp.1113-1122, 2011. ,
DOI : 10.1016/j.jnca.2010.06.008
Secure and scalable cloudbased architecture for e-health wireless sensor networks, Computer communications and networks (ICCCN), 2012 21st international conference on, pp.1-7, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00695956
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks, Future Generation Computer Systems, vol.55, 2015. ,
DOI : 10.1016/j.future.2015.01.009
URL : https://hal.archives-ouvertes.fr/hal-01466815
Web service level agreement (WSLA) language specification. IBM Corporation, pp.815-824, 2003. ,
A security metrics framework for the cloud Quantitative assessment of cloud security level agreements: a case study, Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on Proceedings of Security and Cryptography, pp.245-250, 2011. ,
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards, IEEE Cloud Computing, vol.2, issue.3, pp.32-40, 2015. ,
DOI : 10.1109/MCC.2015.52
Benchmarking cloud security level agreements using quantitative policy trees, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, pp.103-112, 2012. ,
Boolean satisfiability from theoretical hardness to practical success, Communications of the ACM, vol.52, issue.8, pp.76-82, 2009. ,
DOI : 10.1145/1536616.1536637
Typing for conflict detection in access control policies. E- Technologies: Innovation in an Open World, p.212, 2009. ,
Integrating a network IDS into an open source Cloud Computing environment, 2010 Sixth International Conference on Information Assurance and Security, pp.265-270, 2010. ,
DOI : 10.1109/ISIAS.2010.5604069
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.6554
Security and Privacy Issues with Health Care Information Technology, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, 2006. ,
DOI : 10.1109/IEMBS.2006.260060
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6807
Expressing cloud security requirements in deontic contract languages, CLOSER, pp.638-646, 2012. ,
The NIST definition of cloud computing, Reports on Computer Systems Technology, NIST, 2011. ,
DOI : 10.6028/NIST.SP.800-145
A survey on security issues and solutions at different layers of Cloud computing, The Journal of Supercomputing, vol.34, issue.2, pp.561-592, 2013. ,
DOI : 10.1007/s11227-012-0831-5
A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, vol.36, issue.1, pp.42-57, 2013. ,
DOI : 10.1016/j.jnca.2012.05.003
Dcportalsng: Efficient isolation of tenant networks in virtualized datacenters, Proc. 13th ICN, 2014. ,
sVirt: Hardening linux virtualization with mandatory access control ,
An analysis of mosaic ontology for cloud resources annotation, Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on, pp.973-980, 2011. ,
Un cadre formel pour le développement orienté aspect: modélisation et vérification des interactions dues aux aspects, 2008. ,
Characterising access control conflicts, NMR 2012 -14th International Workshop on Non-Monotonic Reasoning, 2012. ,
Security threats/attacks present in cloud environment, IJCSNS, vol.12, issue.12, p.107, 2012. ,
The concept of cloud computing and the main security issues in it, 2015. ,
An intrusion detection and prevention system in cloud computing: A systematic review, Journal of Network and Computer Applications, vol.36, issue.1, pp.25-41, 2013. ,
DOI : 10.1016/j.jnca.2012.08.007
Towards a security sla-based cloud monitoring service, 4th International Conference on Cloud Computing and Services Science (CLOSER), pp.598-603, 2014. ,
DOI : 10.1109/compsac.2014.50
Towards a cross platform cloud API, 1st International Conference on Cloud Computing and Services Science, pp.166-169, 2011. ,
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy, Engineering Secure Software and Systems, pp.15-28, 2011. ,
DOI : 10.1007/978-3-642-19125-1_2
Analysis of different access control mechanism in cloud, International Journal of Applied Information Systems (IJAIS) Foundation of Computer Science FCS, vol.4, issue.2, p.2012 ,
An Efficient WS-QoS Broker Based Architecture for Web Services Selection, International Journal of Computer Applications, vol.1, issue.9, pp.79-84, 2010. ,
DOI : 10.5120/194-333
URL : http://doi.org/10.5120/194-333
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009. ,
DOI : 10.1145/1653662.1653687
Beyond lightning: A survey on security challenges in cloud computing, Computers & Electrical Engineering, vol.39, issue.1, pp.47-54, 2013. ,
DOI : 10.1016/j.compeleceng.2012.04.015
A security management for Cloud based applications and services with Diameter-AAA, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp.6-11, 2014. ,
DOI : 10.1109/ICICICT.2014.6781243
Fuzzy Identity-Based Encryption, Advances in Cryptology?EUROCRYPT 2005, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
The typed access matrix model, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.122-136, 1992. ,
DOI : 10.1109/RISP.1992.213266
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.4885
A framework for organisational control principles, 18th Annual Computer Security Applications Conference, 2002. Proceedings., 2003. ,
DOI : 10.1109/CSAC.2002.1176294
A lightweight approach to specification and analysis of role-based access control extensions, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.13-22, 2002. ,
DOI : 10.1145/507711.507714
Draft security architecture design process for health information exchanges (HIEs), 2009. ,
DOI : 10.6028/nist.ir.7497
A Survey of Intrusion Detection System for Denial of Service Attack in Cloud, International Journal of Computer Applications, vol.120, issue.19, p.2015 ,
DOI : 10.5120/21332-4309
Separation of duty in role-based environments, Proceedings 10th Computer Security Foundations Workshop, pp.183-194, 1997. ,
DOI : 10.1109/CSFW.1997.596811
API access control in cloud using the Role Based Access Control Model, Trendz in Information Sciences & Computing(TISC2010), pp.135-137, 2010. ,
DOI : 10.1109/TISC.2010.5714624
Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access, Financial Cryptography and Data Security, pp.215-222, 2012. ,
DOI : 10.1007/978-3-642-32946-3_16
The Z notation, 1992. ,
Risk management guide for information technology systems, Reports on Computer Systems Technology, 2002. ,
DOI : 10.6028/NIST.SP.800-30
URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA396553
A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2011. ,
DOI : 10.1016/j.jnca.2010.07.006
Eliminating the hypervisor attack surface for a more secure cloud, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.401-412, 2011. ,
DOI : 10.1145/2046707.2046754
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.284-291, 2014. ,
DOI : 10.1109/TrustCom.2014.39
A multi-tenant RBAC model for collaborative cloud services, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.229-238, 2013. ,
DOI : 10.1109/PST.2013.6596058
Multi-tenancy authorization models for collaborative cloud services, Concurrency and Computation: Practice and Experience, 2014. ,
DOI : 10.1002/cpe.3446
A New RBAC Based Access Control Model for Cloud Computing, Advances in Grid and Pervasive Computing, pp.279-288, 2012. ,
DOI : 10.1007/978-3-642-30767-6_24
On the formal analysis of a spatio-temporal rolebased access control model, Data and Applications Security XXII, pp.17-32 ,
Using Alloy to analyse a spatio-temporal access control model supporting delegation, IET Information Security, vol.3, issue.3, pp.75-113, 2009. ,
DOI : 10.1049/iet-ifs.2008.0074
Role-Based Access-Control Using Reference Ontology in Clouds, 2011 Tenth International Symposium on Autonomous Decentralized Systems, pp.121-128, 2011. ,
DOI : 10.1109/ISADS.2011.21
Aneka: a software platform for .NET-based cloud computing, High Speed and Large Scale Scientific Computing, pp.267-295, 2009. ,
A Cloud Agency for SLA Negotiation and Management, Euro-Par 2010 Parallel Processing Workshops, pp.587-594, 2010. ,
DOI : 10.1007/s10723-006-9049-1
HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.743-754, 2012. ,
Hierarchical attribute-based encryption for finegrained access control in cloud storage services, Proceedings of the 17th ACM conference on Computer and communications security, pp.735-737, 2010. ,
Data leakage mitigation for discretionary access control in collaboration clouds, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.103-112, 2011. ,
DOI : 10.1145/1998441.1998457
Role-Based Access Control: the nist solution, SANS Institute InfoSec Reading Room, 2003. ,
High performance string matching algorithm for a network intrusion prevention system (NIPS), 2006 Workshop on High Performance Switching and Routing, p.7, 2006. ,
DOI : 10.1109/HPSR.2006.1709697
Network security for virtual machine in cloud computing Design and implementation of cloud API access control based on OAuth, Computer Sciences and Convergence Information Technology (ICCIT) 5th International Conference on TENCON Spring Conference, pp.18-21, 2010. ,
Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks, High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on, pp.246-257, 2013. ,
Security and Privacy in Cloud Computing, IEEE Communications Surveys & Tutorials, vol.15, issue.2, pp.843-859, 2013. ,
DOI : 10.1109/SURV.2012.060912.00182
SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment, 2013 Second GENI Research and Educational Experiment Workshop, pp.89-92, 2013. ,
DOI : 10.1109/GREE.2013.25
CompatibleOne: The Open Source Cloud Broker, Journal of Grid Computing, vol.3828, issue.2, pp.93-109, 2014. ,
DOI : 10.1007/s10723-013-9285-0
URL : https://hal.archives-ouvertes.fr/hal-01262821
Attributed based access control (ABAC) for Web services, IEEE International Conference on Web Services (ICWS'05) ,
DOI : 10.1109/ICWS.2005.25
CloudVisor, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.203-216, 2011. ,
DOI : 10.1145/2043556.2043576
Security Models and Requirements for Healthcare Application Clouds, 2010 IEEE 3rd International Conference on Cloud Computing, pp.268-275, 2010. ,
DOI : 10.1109/CLOUD.2010.62
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.7184
Attribute Based Access Control and Security for Collaboration Environments, 2008 IEEE National Aerospace and Electronics Conference, pp.31-35, 2008. ,
DOI : 10.1109/NAECON.2008.4806511