Policy Based Security Middleware as a Service

被引:0
|
作者
Chraibi, Mhammed [1 ]
Harroud, Hamid [1 ]
El Khaddar, Mehdia Ajana [2 ]
Elkoutbi, Mohammed [2 ]
Maach, Abdelilah [3 ]
机构
[1] AL Akhawayn Univ, Sch Sci & Engn, Ifrane, Morocco
[2] ENSIAS, SIME Lab, Rabat, Morocco
[3] Mohammed V Univ, Ecole Mohammadia Ingenieurs, Rabat, Morocco
来源
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) | 2014年
关键词
cloud computing; security; middleware; policies;
D O I
10.1109/FiCloud.2014.57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service.
引用
收藏
页码:322 / 327
页数:6
相关论文
共 50 条
  • [1] Security Issues of Service-Oriented Middleware
    Al-Jaroodi, Jameela
    Al-Dhaheri, Alyaziyah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 153 - 160
  • [2] Biologically Inspired Security as a Service for Service-Oriented Middleware
    Jamaluddin, Tashreen Shaikh
    Hassan, Hoda
    Hamza, Haitham S.
    ENASE: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2017, : 121 - 132
  • [3] Distributed Middleware Enforcement of Event Flow Security Policy
    Migliavacca, Matteo
    Papagiannis, Ioannis
    Eyers, David M.
    Shand, Brian
    Bacon, Jean
    Pietzuch, Peter
    MIDDLEWARE 2010, 2010, 6452 : 334 - +
  • [4] From the Queue to the Quality of Service Policy: A Middleware Implementation
    Poza, Jose L.
    Posadas, Juan L.
    Simo, Jose E.
    DISTRIBUTED COMPUTING, ARTIFICIAL INTELLIGENCE, BIOINFORMATICS, SOFT COMPUTING, AND AMBIENT ASSISTED LIVING, PT II, PROCEEDINGS, 2009, 5518 : 432 - 437
  • [5] PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
    Tabiban, Azadeh
    Majumdar, Suryadipta
    Wang, Lingyu
    Debbabi, Mourad
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [6] Research of Secure Service Composition based on Semantic Security Policy
    He Zhengqiu
    Xue Fangxia
    Liu Wenfu
    He Rongmao
    Xu Zhongfu
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 246 - 251
  • [7] Security policy monitoring of BPMN-based service compositions
    Asim, Muhammad
    Yautsiukhin, Artsiom
    Brucker, Achim D.
    Baker, Thar
    Shi, Qi
    Lempereur, Brett
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2018, 30 (09)
  • [8] Efficient security policy enforcement in a location based service environment
    Atluri, Vijayalakshmi
    Shin, Heechang
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 61 - +
  • [9] Vehicle service middleware based on OSGi
    Luo, Juan
    Wu, Feng
    Alkubati, Fahmi Ameen Abdo
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 714 - 717
  • [10] Security and middleware
    Andersen, A
    Blair, G
    Myrvang, PH
    Stabell-Kulo, T
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2003, : 186 - 190