{"title":"Developing trust policies for cloud scenarios","authors":"Aradhana, Inderveer Chana","doi":"10.1109/ICCCT.2011.6075147","DOIUrl":null,"url":null,"abstract":"Security is one of the major areas of concern in cloud computing. Users have to authenticate themselves before accessing the services provided by the service provider so trust forms the basis for secure identity provisioning. Cloud providers need to manage trust along with the risks associated with it. This paper determines process for managing trust and specifying trust policies for cloud scenarios. Further trust policies have been represented in the form of decision table that help in clear implementation of these policies.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT.2011.6075147","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Security is one of the major areas of concern in cloud computing. Users have to authenticate themselves before accessing the services provided by the service provider so trust forms the basis for secure identity provisioning. Cloud providers need to manage trust along with the risks associated with it. This paper determines process for managing trust and specifying trust policies for cloud scenarios. Further trust policies have been represented in the form of decision table that help in clear implementation of these policies.