원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.8 No.4
2014.07
pp.321-328
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
This paper focuses on the research of optimizing the safety and utility, proposing safety policy optimized model in cloud computing environment based on stochastic programming theory, building mathematical models which are on the basis of ensured data security to enhance the users’ utility, model analysis and optimization, and ultimately get the best optimized configuration of security policy in the cloud computing environment to guide the formulation and dynamic adjustment of access control policy in cloud computing environment, and to meet the users’ requirements, such as response time, resources availability and other utility requirements.
목차
Abstract
1. Introduction
2. The Security Situation in the Cloud Computing Environment
3. Dynamic Access Control Model based on the Certificate
3.1 User access control management in cloud computing: when an access request is online,
3.2 Simulation experiments:
4. User Utility Analysis in Cloud Computing Environment based on Risk
4.1. The user utility function:
4.2. Simulation analysis:
5. Conclusion
Acknowledgements
References
1. Introduction
2. The Security Situation in the Cloud Computing Environment
3. Dynamic Access Control Model based on the Certificate
3.1 User access control management in cloud computing: when an access request is online,
3.2 Simulation experiments:
4. User Utility Analysis in Cloud Computing Environment based on Risk
4.1. The user utility function:
4.2. Simulation analysis:
5. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보