Policy Based Security Middleware as a Service

被引:0
作者
Chraibi, Mhammed [1 ]
Harroud, Hamid [1 ]
El Khaddar, Mehdia Ajana [2 ]
Elkoutbi, Mohammed [2 ]
Maach, Abdelilah [3 ]
机构
[1] AL Akhawayn Univ, Sch Sci & Engn, Ifrane, Morocco
[2] ENSIAS, SIME Lab, Rabat, Morocco
[3] Mohammed V Univ, Ecole Mohammadia Ingenieurs, Rabat, Morocco
来源
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) | 2014年
关键词
cloud computing; security; middleware; policies;
D O I
10.1109/FiCloud.2014.57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service.
引用
收藏
页码:322 / 327
页数:6
相关论文
共 50 条
[41]   Security Enhanced RFID Middleware System [J].
Song, Jieun ;
Kim, Taesung ;
Lee, Sokjoon ;
Kim, Howon .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 :79-82
[42]   Middleware for Automated Implementation of Security Protocols [J].
Genge, Bela ;
Haller, Piroska .
SEMANTIC WEB: RESEARCH AND APPLICATIONS, 2009, 5554 :476-490
[43]   Cyber Security for Middleware System Architectures [J].
Colonese, Emilia ;
de Oliveira, Jose Parente ;
Yano, Edgar ;
Amorim, Joni ;
Andler, Sten ;
Gustavsson, Per .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, :361-365
[44]   Cloud computing security: A survey of service-based models [J].
Parast, Fatemeh Khoda ;
Sindhav, Chandni ;
Nikam, Seema ;
Yekta, Hadiseh Izadi ;
Kent, Kenneth B. ;
Hakak, Saqib .
COMPUTERS & SECURITY, 2022, 114
[45]   Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures [J].
Gkioulos, Vasileios ;
Wolthusen, Stephen D. .
FUTURE NETWORK SYSTEMS AND SECURITY, 2016, 670 :47-61
[46]   A Middleware-Based Simulation and Control Framework for Mobile Service Robots [J].
Chen, Peihua ;
Cao, Qixin .
JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 2014, 76 (3-4) :489-504
[47]   Agent based load balancing middleware for service-oriented applications [J].
Wang, Jun ;
Ren, Yi ;
Zheng, Di ;
Wu, Quan-Yuan .
COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 :974-+
[48]   The architecture of an event correlation service for adaptive middleware-based applications [J].
Liu, Yan ;
Gorton, Ian ;
Lee, Vinh Kah .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (12) :2134-2145
[49]   A DDS-Based Middleware for Cooperation of Air Traffic Service Units [J].
Mayer, Erwin ;
Froehlich, Johannes .
COMMUNICATION TECHNOLOGIES FOR VEHICLES, NETS4CARS/NETS4TRAINS/NETS4AIRCRAFT 2014, 2014, 8435 :94-102
[50]   FuzWare: A Fuzzy-based Middleware for Context-aware Service [J].
Zhang, Chuang .
2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, :1181-1185