Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security.
SeongMo AnAsher LeungJin B. HongTaehoon EomJong Sou ParkPublished in: IEEE Access (2022)
Keyphrases
- graphical models
- security analysis
- cloud computing
- security requirements
- belief propagation
- security issues
- access control
- data center
- smart card
- encryption scheme
- cloud computing environment
- probabilistic model
- public key
- bayesian networks
- information security
- data management
- access control policies
- user authentication
- encryption algorithm
- cloud storage
- service providers
- computing infrastructure
- data privacy
- security mechanisms
- cloud services
- conflict resolution
- security protocols
- databases
- security policies
- message passing
- information systems