|
MAIN PAGE
> Back to contents
National Security
Reference:
Tsaregorodtsev, A.V., Kachkov, A.K.
One of the approaches to modeling the route for
spread of analysis of critical data in the hybrid area
of cloud computing.
// National Security.
2012. № 5.
P. 43-49.
URL: https://en.nbpublish.com/library_read_article.php?id=61547
Tsaregorodtsev, A.V., Kachkov, A.K. One of the approaches to modeling the route for
spread of analysis of critical data in the hybrid area
of cloud computing.
Abstract:
Use of cloud computing when forming the IT – infrastructure
of the organization presupposes that the organization
shall not control the aspects of security directly.
There is need to guarantee conifdentiality of the data,
when forming the architecture based on the cloud computing.
The approach of modelling the data processing
with the Petri nets in accordance with the requirements
of the security policy of the organization allows to gain
important information on the structure of multi-level
system of access management in the hybrid cloud area.
In the end it allows to follow dynamic behavior of processing
critical data in the modelled system.
Keywords:
security models for the computer systems, cloud computing, public cloud, private cloud, hybrid cloud, security requirements, data confidentiality, modelling.
This article can be downloaded freely in PDF format for reading. Download article
This article written in Russian. You can find original text of the article here
.
References
1. Piterson Dzh. Teoriya setey Petri i modelirovanie sistem. – M.:MIR, 1981. – 263 s.
2. National Institute of Standards and Technology (NIST) Def init ion of Cloud Computing, http://csrc.nist.gov/groups/SNS/ cloud-computing/
3. R.L. Trope, E.M. Power, V.I. Polley and B.C.Morley. «A Coherent Strategy for Data Security through Data Governance». IEEE Security & Privacy, vol. 5, no. 3, pp. 32-39, May/ Jun. 2007.
4. Bishop M. Computer Security: art and science. ISBN 0-201-44099-7. 2002. 1084 p.
5. R. Accorsi, C. Wonnemann. «Auditing Workflow Execution against Dataflow Policies» In Proc. BIS, 2010, pp. 207-217.
6. Bell, D. E. and LaPadula, L. J.: Secure Computer System: Unif ied Exposit ion and Mult ics Interpretation, Tech report ESD-TR-75-306, Mitre Corp, Bedford, Ma. (1976)
Link to this article
You can simply select and copy link from below text field.
|
|