Home > Research > Publications & Outputs > A methodology for the development and verificat...
View graph of relations

A methodology for the development and verification of access control systems in cloud computing

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

Published

Standard

A methodology for the development and verification of access control systems in cloud computing. / Gouglidis, Antonios; Mavridis, Ioannis.

Collaborative, Trusted and Privacy-Aware e/m-Services. ed. / Christos Douligeris; Nineta Polemi; Athanasios Karantjias; Winfried Lamersdorf. Berlin : Springer Verlag, 2013. p. 88-99 (IFIP Advances in Information and Communication Technology ; Vol. 399).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

Harvard

Gouglidis, A & Mavridis, I 2013, A methodology for the development and verification of access control systems in cloud computing. in C Douligeris, N Polemi, A Karantjias & W Lamersdorf (eds), Collaborative, Trusted and Privacy-Aware e/m-Services. IFIP Advances in Information and Communication Technology , vol. 399, Springer Verlag, Berlin, pp. 88-99. https://doi.org/10.1007/978-3-642-37437-1_8

APA

Gouglidis, A., & Mavridis, I. (2013). A methodology for the development and verification of access control systems in cloud computing. In C. Douligeris, N. Polemi, A. Karantjias, & W. Lamersdorf (Eds.), Collaborative, Trusted and Privacy-Aware e/m-Services (pp. 88-99). (IFIP Advances in Information and Communication Technology ; Vol. 399). Springer Verlag. https://doi.org/10.1007/978-3-642-37437-1_8

Vancouver

Gouglidis A, Mavridis I. A methodology for the development and verification of access control systems in cloud computing. In Douligeris C, Polemi N, Karantjias A, Lamersdorf W, editors, Collaborative, Trusted and Privacy-Aware e/m-Services. Berlin: Springer Verlag. 2013. p. 88-99. (IFIP Advances in Information and Communication Technology ). https://doi.org/10.1007/978-3-642-37437-1_8

Author

Gouglidis, Antonios ; Mavridis, Ioannis. / A methodology for the development and verification of access control systems in cloud computing. Collaborative, Trusted and Privacy-Aware e/m-Services. editor / Christos Douligeris ; Nineta Polemi ; Athanasios Karantjias ; Winfried Lamersdorf. Berlin : Springer Verlag, 2013. pp. 88-99 (IFIP Advances in Information and Communication Technology ).

Bibtex

@inbook{fea68aeb33244c478a6a7b0b4f6929f1,
title = "A methodology for the development and verification of access control systems in cloud computing",
abstract = "Cloud computing is an emergent technology that has generated significant interest in the marketplace and is forecasted for high growth. Moreover, Cloud computing has a great impact on different type of users from individual consumers and businesses to small and medium size (SMBs) and enterprise businesses. Although there are many benefits to adopting Cloud computing, there are significant barriers to adoption, viz. security and privacy. In this paper, we focus on carefully planning security aspects regarding access control of Cloud computing solutions before implementing them and, furthermore, on ensuring they satisfy particular organizational security requirements. Specifically, we propose a methodology for the development of access control systems. The methodology is capable of utilizing existing security requirements engineering approaches for the definition and evaluation of access control models, and verification of access control systems against organizational security requirements using techniques that are based on formal methods. A proof of concept example is provided that demonstrates the application of the proposed methodology on Cloud computing systems.",
keywords = "Security, Inter-organizational systems, Cloud business, Verification",
author = "Antonios Gouglidis and Ioannis Mavridis",
year = "2013",
doi = "10.1007/978-3-642-37437-1_8",
language = "English",
isbn = "9783642374364",
series = "IFIP Advances in Information and Communication Technology ",
publisher = "Springer Verlag",
pages = "88--99",
editor = "Christos Douligeris and Nineta Polemi and Athanasios Karantjias and Winfried Lamersdorf",
booktitle = "Collaborative, Trusted and Privacy-Aware e/m-Services",

}

RIS

TY - CHAP

T1 - A methodology for the development and verification of access control systems in cloud computing

AU - Gouglidis, Antonios

AU - Mavridis, Ioannis

PY - 2013

Y1 - 2013

N2 - Cloud computing is an emergent technology that has generated significant interest in the marketplace and is forecasted for high growth. Moreover, Cloud computing has a great impact on different type of users from individual consumers and businesses to small and medium size (SMBs) and enterprise businesses. Although there are many benefits to adopting Cloud computing, there are significant barriers to adoption, viz. security and privacy. In this paper, we focus on carefully planning security aspects regarding access control of Cloud computing solutions before implementing them and, furthermore, on ensuring they satisfy particular organizational security requirements. Specifically, we propose a methodology for the development of access control systems. The methodology is capable of utilizing existing security requirements engineering approaches for the definition and evaluation of access control models, and verification of access control systems against organizational security requirements using techniques that are based on formal methods. A proof of concept example is provided that demonstrates the application of the proposed methodology on Cloud computing systems.

AB - Cloud computing is an emergent technology that has generated significant interest in the marketplace and is forecasted for high growth. Moreover, Cloud computing has a great impact on different type of users from individual consumers and businesses to small and medium size (SMBs) and enterprise businesses. Although there are many benefits to adopting Cloud computing, there are significant barriers to adoption, viz. security and privacy. In this paper, we focus on carefully planning security aspects regarding access control of Cloud computing solutions before implementing them and, furthermore, on ensuring they satisfy particular organizational security requirements. Specifically, we propose a methodology for the development of access control systems. The methodology is capable of utilizing existing security requirements engineering approaches for the definition and evaluation of access control models, and verification of access control systems against organizational security requirements using techniques that are based on formal methods. A proof of concept example is provided that demonstrates the application of the proposed methodology on Cloud computing systems.

KW - Security

KW - Inter-organizational systems

KW - Cloud business

KW - Verification

U2 - 10.1007/978-3-642-37437-1_8

DO - 10.1007/978-3-642-37437-1_8

M3 - Other chapter contribution

SN - 9783642374364

T3 - IFIP Advances in Information and Communication Technology

SP - 88

EP - 99

BT - Collaborative, Trusted and Privacy-Aware e/m-Services

A2 - Douligeris, Christos

A2 - Polemi, Nineta

A2 - Karantjias, Athanasios

A2 - Lamersdorf, Winfried

PB - Springer Verlag

CY - Berlin

ER -