A Distributed Access Control Architecture for Cloud Computing
The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed archi...
Gespeichert in:
Veröffentlicht in: | IEEE software 2012-03, Vol.29 (2), p.36-44 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 44 |
---|---|
container_issue | 2 |
container_start_page | 36 |
container_title | IEEE software |
container_volume | 29 |
creator | Almutairi, A. Sarfraz, M. Basalamah, S. Aref, W. Ghafoor, A. |
description | The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture. |
doi_str_mv | 10.1109/MS.2011.153 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MS_2011_153</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6095492</ieee_id><sourcerecordid>2636231701</sourcerecordid><originalsourceid>FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</originalsourceid><addsrcrecordid>eNo90D1PwzAQgGELgUQpTIwskRhRyp0dJ_HAEKV8Sa0YCrOV2BdI1dbFdgb-PamKmG64R3fSy9g1wgwR1P1yNeOAOEMpTtgElSjSDFV2yiZQZJAWmVTn7CKENQBIFDBhD1Uy70P0fTtEskllDIWQ1G4XvdsklTdffSQTB09J53xSb9xgx_V2P8R-93nJzrpmE-jqb07Zx9Pje_2SLt6eX-tqkRpRqpi2quCyBNtYW3KSsiGFEniOkmxpuCw4x44KkrwQbQeGLKc2zwEFtq3MuJiy2-PdvXffA4Wo127wu_GlRgAslUSOo7o7KuNdCJ46vff9tvE_I9KHPnq50oc-euwz6puj7onoX-agZKa4-AWI2F8I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1001895121</pqid></control><display><type>article</type><title>A Distributed Access Control Architecture for Cloud Computing</title><source>IEEE Electronic Library (IEL)</source><creator>Almutairi, A. ; Sarfraz, M. ; Basalamah, S. ; Aref, W. ; Ghafoor, A.</creator><creatorcontrib>Almutairi, A. ; Sarfraz, M. ; Basalamah, S. ; Aref, W. ; Ghafoor, A.</creatorcontrib><description>The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture.</description><identifier>ISSN: 0740-7459</identifier><identifier>EISSN: 1937-4194</identifier><identifier>DOI: 10.1109/MS.2011.153</identifier><identifier>CODEN: IESOEG</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Access control ; Analysis ; Authorization ; Cloud computing ; Collaboration ; Computer architecture ; Computer security ; Customer services ; Design ; distributed access control ; multitenancy ; Privacy ; Resource management ; resource virtualization ; Security management ; Semantics ; Software engineering ; Studies</subject><ispartof>IEEE software, 2012-03, Vol.29 (2), p.36-44</ispartof><rights>Copyright IEEE Computer Society Mar/Apr 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</citedby><cites>FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6095492$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6095492$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Almutairi, A.</creatorcontrib><creatorcontrib>Sarfraz, M.</creatorcontrib><creatorcontrib>Basalamah, S.</creatorcontrib><creatorcontrib>Aref, W.</creatorcontrib><creatorcontrib>Ghafoor, A.</creatorcontrib><title>A Distributed Access Control Architecture for Cloud Computing</title><title>IEEE software</title><addtitle>S-M</addtitle><description>The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture.</description><subject>Access control</subject><subject>Analysis</subject><subject>Authorization</subject><subject>Cloud computing</subject><subject>Collaboration</subject><subject>Computer architecture</subject><subject>Computer security</subject><subject>Customer services</subject><subject>Design</subject><subject>distributed access control</subject><subject>multitenancy</subject><subject>Privacy</subject><subject>Resource management</subject><subject>resource virtualization</subject><subject>Security management</subject><subject>Semantics</subject><subject>Software engineering</subject><subject>Studies</subject><issn>0740-7459</issn><issn>1937-4194</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNo90D1PwzAQgGELgUQpTIwskRhRyp0dJ_HAEKV8Sa0YCrOV2BdI1dbFdgb-PamKmG64R3fSy9g1wgwR1P1yNeOAOEMpTtgElSjSDFV2yiZQZJAWmVTn7CKENQBIFDBhD1Uy70P0fTtEskllDIWQ1G4XvdsklTdffSQTB09J53xSb9xgx_V2P8R-93nJzrpmE-jqb07Zx9Pje_2SLt6eX-tqkRpRqpi2quCyBNtYW3KSsiGFEniOkmxpuCw4x44KkrwQbQeGLKc2zwEFtq3MuJiy2-PdvXffA4Wo127wu_GlRgAslUSOo7o7KuNdCJ46vff9tvE_I9KHPnq50oc-euwz6puj7onoX-agZKa4-AWI2F8I</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Almutairi, A.</creator><creator>Sarfraz, M.</creator><creator>Basalamah, S.</creator><creator>Aref, W.</creator><creator>Ghafoor, A.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2O</scope><scope>M2P</scope><scope>M2T</scope><scope>M7S</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>201203</creationdate><title>A Distributed Access Control Architecture for Cloud Computing</title><author>Almutairi, A. ; Sarfraz, M. ; Basalamah, S. ; Aref, W. ; Ghafoor, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Access control</topic><topic>Analysis</topic><topic>Authorization</topic><topic>Cloud computing</topic><topic>Collaboration</topic><topic>Computer architecture</topic><topic>Computer security</topic><topic>Customer services</topic><topic>Design</topic><topic>distributed access control</topic><topic>multitenancy</topic><topic>Privacy</topic><topic>Resource management</topic><topic>resource virtualization</topic><topic>Security management</topic><topic>Semantics</topic><topic>Software engineering</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Almutairi, A.</creatorcontrib><creatorcontrib>Sarfraz, M.</creatorcontrib><creatorcontrib>Basalamah, S.</creatorcontrib><creatorcontrib>Aref, W.</creatorcontrib><creatorcontrib>Ghafoor, A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>IEEE software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Almutairi, A.</au><au>Sarfraz, M.</au><au>Basalamah, S.</au><au>Aref, W.</au><au>Ghafoor, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Distributed Access Control Architecture for Cloud Computing</atitle><jtitle>IEEE software</jtitle><stitle>S-M</stitle><date>2012-03</date><risdate>2012</risdate><volume>29</volume><issue>2</issue><spage>36</spage><epage>44</epage><pages>36-44</pages><issn>0740-7459</issn><eissn>1937-4194</eissn><coden>IESOEG</coden><abstract>The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MS.2011.153</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0740-7459 |
ispartof | IEEE software, 2012-03, Vol.29 (2), p.36-44 |
issn | 0740-7459 1937-4194 |
language | eng |
recordid | cdi_crossref_primary_10_1109_MS_2011_153 |
source | IEEE Electronic Library (IEL) |
subjects | Access control Analysis Authorization Cloud computing Collaboration Computer architecture Computer security Customer services Design distributed access control multitenancy Privacy Resource management resource virtualization Security management Semantics Software engineering Studies |
title | A Distributed Access Control Architecture for Cloud Computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T05%3A22%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Distributed%20Access%20Control%20Architecture%20for%20Cloud%20Computing&rft.jtitle=IEEE%20software&rft.au=Almutairi,%20A.&rft.date=2012-03&rft.volume=29&rft.issue=2&rft.spage=36&rft.epage=44&rft.pages=36-44&rft.issn=0740-7459&rft.eissn=1937-4194&rft.coden=IESOEG&rft_id=info:doi/10.1109/MS.2011.153&rft_dat=%3Cproquest_RIE%3E2636231701%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1001895121&rft_id=info:pmid/&rft_ieee_id=6095492&rfr_iscdi=true |