The interaction between different applications and services requires expressing their security properties. This is typically defined as security policies, which aim at specifying the diverse privileges of different actors. Today similarity measure for comparing security policies becomes a crucial technique in a variety of scenarios, such as finding the cloud service providers which satisfy client's security concerns. Existing approaches cover from semantic to numerical dimensions and the main work focuses mainly on XACML policies. However, few efforts have been made to extend the measure approach to multiple policy models and apply it to concrete scenarios. In this paper, we propose a generic and light-weight method to compare and evaluate ...
Although the use of Cloud services is proliferating, the notion of Cloud security remains ambiguous....
Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud ...
Security has become one of the primary factors that cloud customers consider when they select a clou...
International audienceThe interaction between different applications and services requires expressin...
Recent collaborative applications and enterprises very often need to efficiently integrate their acc...
Recent collaborative applications and enterprises very often need to efficiently integrate their acc...
Security policy provides a way to define the constraints on behavior of the members belonging to a s...
The need to analyze and compare the security specifications of different applications can arise in d...
Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere ...
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Com...
While Cloud usage increasingly involves security considerations, there is still a conspicuous lack o...
Technologies such as Internet of Things allow small devices to offer web-based services in an open a...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
Current approaches to privacy policy comparison use strict evaluation criteria (e.g. user preference...
Although the use of Cloud services is proliferating, the notion of Cloud security remains ambiguous....
Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud ...
Security has become one of the primary factors that cloud customers consider when they select a clou...
International audienceThe interaction between different applications and services requires expressin...
Recent collaborative applications and enterprises very often need to efficiently integrate their acc...
Recent collaborative applications and enterprises very often need to efficiently integrate their acc...
Security policy provides a way to define the constraints on behavior of the members belonging to a s...
The need to analyze and compare the security specifications of different applications can arise in d...
Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere ...
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Com...
While Cloud usage increasingly involves security considerations, there is still a conspicuous lack o...
Technologies such as Internet of Things allow small devices to offer web-based services in an open a...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
Current approaches to privacy policy comparison use strict evaluation criteria (e.g. user preference...
Although the use of Cloud services is proliferating, the notion of Cloud security remains ambiguous....
Security concerns are often mentioned amongst the reasons why organizations hesitate to adopt Cloud ...
Security has become one of the primary factors that cloud customers consider when they select a clou...