{"title":"Resource management and authorization for cloud services","authors":"Alexander Lawall, D. Reichelt, Thomas W. Schaller","doi":"10.1145/2723839.2723864","DOIUrl":null,"url":null,"abstract":"In the age of cloud computing, companies still have the problem to manage access rights for resources. This is especially true, if companies are combined to virtual organizations and want to share resources that are located at cloud providers. For a consistent authorization model, an up to date knowledge about partner organizations is indispensable. This contribution proposes an approach to request the automatic deployment of resources from a cloud provider. The access rights to the resources are managed and administered by the proprietary company, even if partner organizations are involved. They are not published to the cloud provider, but remain in the owning company. This establishes a separation of resources (i.a. systems) and authorization, which alleviates security risks. Attackers of resources can not access them because the authorization model is not implemented on the same location as the resources. This makes the intrusion much more complex.","PeriodicalId":311009,"journal":{"name":"Proceedings of the 7th International Conference on Subject-Oriented Business Process Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th International Conference on Subject-Oriented Business Process Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2723839.2723864","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
In the age of cloud computing, companies still have the problem to manage access rights for resources. This is especially true, if companies are combined to virtual organizations and want to share resources that are located at cloud providers. For a consistent authorization model, an up to date knowledge about partner organizations is indispensable. This contribution proposes an approach to request the automatic deployment of resources from a cloud provider. The access rights to the resources are managed and administered by the proprietary company, even if partner organizations are involved. They are not published to the cloud provider, but remain in the owning company. This establishes a separation of resources (i.a. systems) and authorization, which alleviates security risks. Attackers of resources can not access them because the authorization model is not implemented on the same location as the resources. This makes the intrusion much more complex.