• Aucun résultat trouvé

[PDF] Top 20 Formal Modelling and Verification of Security Policies in Cloud Computing

Has 10000 "Formal Modelling and Verification of Security Policies in Cloud Computing" found on our website. Below are the top 20 most common "Formal Modelling and Verification of Security Policies in Cloud Computing".

Formal Modelling and Verification of Security Policies in Cloud Computing

Formal Modelling and Verification of Security Policies in Cloud Computing

... RBAC and ABAC cannot be directly applied to IoT because of their ...exploited in IoT applications. RBAC deals with the distribution problem of competencies where time and location ... Voir le document complet

104

An Event-B based approach for formal modelling and verification of smart contracts

An Event-B based approach for formal modelling and verification of smart contracts

... deployed and residing at a specific address on the blockchain ...transactions and agreements to be established among parties without relying on a centralized authority or giving participants the ability to ... Voir le document complet

8

End-to-end security architecture for cloud computing environments

End-to-end security architecture for cloud computing environments

... declined in several categories and often referred in terms of subjects and ...series of operations on ...purposes of generically modelling AC approaches and ... Voir le document complet

180

Formal proofs of code generation and verification tools

Formal proofs of code generation and verification tools

... CompCert and Verasco share a common methodology based on interac- tive theorem proving in the Coq proof ...specification and proving, but also as a programming language, to implement all the ... Voir le document complet

5

Planning and Management of Cloud Computing Networks

Planning and Management of Cloud Computing Networks

... analyzed in Section 4.6. Finally, conclusions are presented in Section ...work In the last years, cloud computing has attracted the attention of academia and industry to ... Voir le document complet

169

Formal Security Proof of CMAC and Its Variants

Formal Security Proof of CMAC and Its Variants

... probability of sampling a particular value for Y i−1 ...occurs in a previous iteration of the loop, and may in fact be overwritten, losing its “randomness” for the next iteration where ... Voir le document complet

15

Formal Security Analysis of Traditional and Electronic Exams

Formal Security Analysis of Traditional and Electronic Exams

... best of our knowledge, no formal definitions have been given for the security properties of traditional and e-exam ...formalization and verification of properties ... Voir le document complet

23

Formal verification of Mobile Robot Protocols

Formal verification of Mobile Robot Protocols

... system of k mobile robots that have limited capabilities: they are identical and anonymous (they execute the same algorithm and they cannot be distinguished using their appearance), they are ... Voir le document complet

26

A new secure network architecture to increase security among virtual machines in cloud computing

A new secure network architecture to increase security among virtual machines in cloud computing

... processes of sniffing within a virtual network in this case: Xen Hypervisor, assuming that VM-A would communicate with VM-B and the Attacker VM-C will sniff the ...VM-B and as VM-C is placed ... Voir le document complet

12

Automatic reconstruction and analysis of security policies from deployed security components

Automatic reconstruction and analysis of security policies from deployed security components

... ANALYSIS OF STATEFUL MISCONFIGURATIONS 69 1 2 : iptables −A InvRP −j LOG −−log−prefix ’InvRP ’ 1 3 : iptables −A InvRP −j DROP Equivalent reasoning can be used to complement the set of rules and ... Voir le document complet

157

Formal Verification of Netlog Protocols

Formal Verification of Netlog Protocols

... rules of a program are applied in parallel: in a given state, all bodies are evaluated over the local instance of a node and results (heads) are computed, using facts either stored on ... Voir le document complet

9

Extended use of SOA and Cloud Computing Security Gateway Protocol for Big Data analytic sessions

Extended use of SOA and Cloud Computing Security Gateway Protocol for Big Data analytic sessions

... communication, in case the BPR is the only ...benefits, and most organizations must not try to adopt BPR unless they feel they have nothing to ...part of software engineering, and the use ... Voir le document complet

159

Cloud security and platform thinking : an analysis of Cisco Umbrella, a cloud-delivered enterprise security

Cloud security and platform thinking : an analysis of Cisco Umbrella, a cloud-delivered enterprise security

... For example, in the first phase, Cisco could deploy it's existing cloud security solutions for securing public cloud (Cisco Stealthwatch Cloud - Observable Networks [r] ... Voir le document complet

114

Formal Verification of e-Auction Protocols

Formal Verification of e-Auction Protocols

... secrecy of the variables b_1, ..., b_n., i.e. to check that any two instances of the protocol that only differ in these variables are ...values and compares the ...proposed in the ... Voir le document complet

30

Production of norms and securitization in development policies : from "Human Security" to "Security Sector Reform"

Production of norms and securitization in development policies : from "Human Security" to "Security Sector Reform"

... marginalization of the role of the state in the countries concerned by these policy transfers, which also allows further interventions and questions national ...sovereignty. In this ... Voir le document complet

26

Enhancing Formal Specification and Verification of Temporal Constraints in Business Processes

Enhancing Formal Specification and Verification of Temporal Constraints in Business Processes

... specification and verification support of time-related constraints constitute fundamental challenges for any Business Process Management (BPM) ...subject of formal specification ... Voir le document complet

9

Cloud computing models

Cloud computing models

... IaaS service delivery model is likely to keep losing market share to PaaS and SaaS models because companies realize more value and resource-savings from software and pl[r] ... Voir le document complet

80

Formal verification of mobile robot protocols

Formal verification of mobile robot protocols

... RC4, and the move is performed. In the last configuration the gray robot performs its LC phase and according to the RL2 rule, it chooses to move toward the light gray one, on the same node where the ... Voir le document complet

33

Formal Security Proofs of Cryptographic Standards

Formal Security Proofs of Cryptographic Standards

... step of our proof is to collapse the layered construction into a final simulator, shown in Figure ...cost of simulator queries, aligning them with the announced notion of query cost, ... Voir le document complet

154

A Taxonomy and Survey of Scientific Computing in the Cloud

A Taxonomy and Survey of Scientific Computing in the Cloud

... analyse and understand scientific ...amount of data. Montage workflow [52] is an example in astronomical study for generating sky mosaics in the scale of hundreds of ...composed ... Voir le document complet

24

Show all 10000 documents...