Policy Based Security Middleware as a Service

被引:0
作者
Chraibi, Mhammed [1 ]
Harroud, Hamid [1 ]
El Khaddar, Mehdia Ajana [2 ]
Elkoutbi, Mohammed [2 ]
Maach, Abdelilah [3 ]
机构
[1] AL Akhawayn Univ, Sch Sci & Engn, Ifrane, Morocco
[2] ENSIAS, SIME Lab, Rabat, Morocco
[3] Mohammed V Univ, Ecole Mohammadia Ingenieurs, Rabat, Morocco
来源
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) | 2014年
关键词
cloud computing; security; middleware; policies;
D O I
10.1109/FiCloud.2014.57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service.
引用
收藏
页码:322 / 327
页数:6
相关论文
共 50 条
[31]   A Context Aware Ontology Based Middleware Framework for Service Discovery [J].
Siddarth, E. Christopher .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03) :61-71
[32]   Service rendering middleware (SRM) based on the intelligent LOD algorithm [J].
Kim, Hakran ;
Yoon, Yongik ;
Park, Hwajin .
UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2006, 4159 :776-785
[33]   Towards a Service-Based Middleware Layer for Runtime Environments [J].
Al-Gahmi, Abdulmalik ;
Cook, Jonathan .
APPLIED COMPUTING 2008, VOLS 1-3, 2008, :507-511
[34]   Design of a Cloud Robotics Middleware based on web service technology [J].
Luo, Jie ;
Zhang, Lei ;
Zhang, Huaxi .
2017 18TH INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS (ICAR), 2017, :487-492
[35]   Fuzzy Based Modeling for an Effective IT Security Policy Management [J].
Subramanian, D. Venkata ;
Kumar, K. Pradheep .
PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, :173-181
[36]   A Policy Based Event Management Middleware for Implementing RFID Applications [J].
Ajana, M. E. ;
Boulmalf, M. ;
Harroud, H. ;
Hamam, H. .
2009 IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2009, :406-+
[37]   An IoT Middleware of Data Service [J].
Wu, Yu ;
Li, Minbo .
2018 IEEE 11TH CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2018, :121-128
[38]   Security Middleware Infrastructure for DICOM Images in Health Information Systems [J].
Vijay N. V. Kallepalli ;
Sylvanus A. Ehikioya ;
Sergio Camorlinga ;
Jose A. Rueda .
Journal of Digital Imaging, 2003, 16 :356-364
[39]   A Middleware Framework to Address Security Issues in Integrated Multisystem Applications [J].
Mohamed, Nader ;
Al-Jaroodi, Jameela .
2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
[40]   Security middleware infrastructure for DICOM images in health information systems [J].
Kallepalli, VNV ;
Ehikioya, SA ;
Camorlinga, S ;
Rueda, JA .
JOURNAL OF DIGITAL IMAGING, 2003, 16 (04) :356-364