Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/6898
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Anupa, J. | |
dc.contributor.author | Sekaran, K.C. | |
dc.date.accessioned | 2020-03-30T09:46:21Z | - |
dc.date.available | 2020-03-30T09:46:21Z | - |
dc.date.issued | 2014 | |
dc.identifier.citation | 1st International Conference on Networks and Soft Computing, ICNSC 2014 - Proceedings, 2014, Vol., , pp.85-91 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/6898 | - |
dc.description.abstract | Workflow Management Systems (WfMSs) help big enterprises in automation of their business processes and thus help the management to take critical decisions fast. The WfMSs can be combined with the power of Cloud Computing to harness the strengths of both the technologies. The use of WfMSs for critical and strategic applications, which is common in case of business and scientific community, gives rise to major concerns regarding the threats against integrity, authorization, availability etc. Security is a major concern in case of the Cloud Computing platform too. The Aggressive Chinese Wall Security Policy (ACWSP) aims at mitigating the conflict of interest scenarios in commercial organizations. This paper discusses how to implement ACWSP in WfMSs along with the Role Based Access Control (RBAC) through an API. Further this paper throws light on how the ACWSP can be applied to various layers in the Cloud Computing Service Model. � 2014 IEEE. | en_US |
dc.title | Securing cloud workflows using Aggressive Chinese Wall Security Policy | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.