B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faatheima
{"title":"云环境中访问控制策略组合代数","authors":"B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faatheima","doi":"10.1109/ICIICT.2015.7396067","DOIUrl":null,"url":null,"abstract":"The Multi-tenancy nature of the cloud is prone to several data leakage, threats and malicious attacks. The access control techniques are the major ways through which these threats can be exterminated. The firewalls and the current access control techniques were not efficient in meeting the challenges faced by the cloud environment. The access control policy composition is a substantial requirement of cloud environment. In this paper, we propose an algebra for the composition of a Role-based access control policy. Generally in a role based access control, the privileges are given to the individuals based on their roles within an organization. The traditional and some new algebraic operators were used and their semantics are redefined to suit the cloud environments.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"115 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An algebra for composing access control policies in cloud\",\"authors\":\"B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faatheima\",\"doi\":\"10.1109/ICIICT.2015.7396067\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Multi-tenancy nature of the cloud is prone to several data leakage, threats and malicious attacks. The access control techniques are the major ways through which these threats can be exterminated. The firewalls and the current access control techniques were not efficient in meeting the challenges faced by the cloud environment. The access control policy composition is a substantial requirement of cloud environment. In this paper, we propose an algebra for the composition of a Role-based access control policy. Generally in a role based access control, the privileges are given to the individuals based on their roles within an organization. The traditional and some new algebraic operators were used and their semantics are redefined to suit the cloud environments.\",\"PeriodicalId\":135283,\"journal\":{\"name\":\"International Confernce on Innovation Information in Computing Technologies\",\"volume\":\"115 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Confernce on Innovation Information in Computing Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIICT.2015.7396067\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Confernce on Innovation Information in Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIICT.2015.7396067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An algebra for composing access control policies in cloud
The Multi-tenancy nature of the cloud is prone to several data leakage, threats and malicious attacks. The access control techniques are the major ways through which these threats can be exterminated. The firewalls and the current access control techniques were not efficient in meeting the challenges faced by the cloud environment. The access control policy composition is a substantial requirement of cloud environment. In this paper, we propose an algebra for the composition of a Role-based access control policy. Generally in a role based access control, the privileges are given to the individuals based on their roles within an organization. The traditional and some new algebraic operators were used and their semantics are redefined to suit the cloud environments.