Role-Based Access Control Models
Computer
A Security Characterisation Framework for Trustworthy Component Based Software Systems
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
Authorization and Privacy for Semantic Web Services
IEEE Intelligent Systems
Assessing Security Properties of Software Components: A Software Engineer's Perspective
ASWEC '06 Proceedings of the Australian Software Engineering Conference
International Journal of Web and Grid Services
A Process Algebra Approach for the Compatibility Analysis of Web Services
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01
Security Conscious Web Service Composition with Semantic Web Support
ICDEW '07 Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering Workshop
A schema for ontology-based concept definition and identification
International Journal of Computer Applications in Technology
Semantic Annotations for WS-Policy
ICWS '10 Proceedings of the 2010 IEEE International Conference on Web Services
Context-aware agents in cooperative design environment
International Journal of Computer Applications in Technology
Policy of Composition ? Composition of Policies
POLICY '11 Proceedings of the 2011 IEEE International Symposium on Policies for Distributed Systems and Networks
A methodology for web services-based SOA realisation
International Journal of Business Information Systems
A feature-oriented approach to platform-specific modelling of coarse-grained components
International Journal of Computer Applications in Technology
ICAF: a context-aware framework for access control
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
International Journal of Computer Applications in Technology
Hi-index | 0.00 |
This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security mismatches, our proposed framework provides a security ontology to support flexible specification of security policies and to allow semantic matching and run-time reasoning about the compatibility between security requirements and assurances of the interacting systems in multi-tenant service-oriented systems. The paper also defines various compositional models of a client based on the requirements of specific use context and users' profile of the client for a service.