Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy.
Srijita BasuAnirban SenguptaChandan MazumdarPublished in: Enterp. Inf. Syst. (2016)
Keyphrases
- security policies
- access control
- security measures
- distributed systems
- network security
- security management
- security requirements
- access control mechanism
- cyber attacks
- access control systems
- security architecture
- ubiquitous computing environments
- cloud computing
- security concerns
- network management
- data security
- access control policies
- data mining
- network access
- security model
- information systems
- role based access control
- key management
- operating system
- databases