Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach.
Nirnay GhoshTriparna MondalDebangshu ChatterjeeSoumya K. GhoshPublished in: SECRYPT (2014)
Keyphrases
- access control
- role based access control
- cloud computing
- information technology
- cloud storage
- information security
- decision making
- statistical databases
- security policies
- intrusion detection
- social capital
- critical success factors
- cloud infrastructure
- information systems
- malware detection
- computing infrastructure
- network access