Ensuring distributed accountability for data sharing in the cloud
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. A major feature of the cloud services is that users' data are usually …
on an as-needed basis. A major feature of the cloud services is that users' data are usually …
Audit-based compliance control
In this paper we introduce a new framework for controlling compliance to discretionary
access control policies [Cederquist et al. in Proceedings of the International Workshop on …
access control policies [Cederquist et al. in Proceedings of the International Workshop on …
Promoting distributed accountability in the cloud
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. A major feature of the cloud services is that users' data is usually …
on an as-needed basis. A major feature of the cloud services is that users' data is usually …
Audit-based access control for electronic health records
MAC Dekker, S Etalle - Electronic notes in theoretical computer science, 2007 - Elsevier
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, ie
before granting a request for a document. There are scenarios however where the security …
before granting a request for a document. There are scenarios however where the security …
Accountability in computing: concepts and mechanisms
Accountability is a widely studied but amorphous concept, used to mean different things
across different disciplines and domains of application. Here, we survey work on …
across different disciplines and domains of application. Here, we survey work on …
The financial auditing of distributed ledgers, blockchain and cryptocurrencies
D Broby, G Paul - Journal of financial transformation, 2017 - pureportal.strath.ac.uk
The internet and digital transfer of money is set to fundamentally change the way financial
audits are conducted. This paper critically assesses the way that such assets are currently …
audits are conducted. This paper critically assesses the way that such assets are currently …
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker… - … on Policies for …, 2005 - ieeexplore.ieee.org
We describe a policy language and implement its associated proof checking system. In our
system, agents can distribute data along with usage policies in a decentralized architecture …
system, agents can distribute data along with usage policies in a decentralized architecture …
Correct audit logging: Theory and practice
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …
security, with auditing a crucial component of it. However, in systems where auditing is used …
[PDF][PDF] A PROFICIENT MODEL FOR HIGH END SECURITY IN CLOUD COMPUTING.
RB Chandar, MS Kavitha… - ICTACT journal on soft …, 2014 - pdfs.semanticscholar.org
Cloud computing is an inspiring technology due to its abilities like ensuring scalable
services, reducing the anxiety of local hardware and software management associated with …
services, reducing the anxiety of local hardware and software management associated with …
[PDF][PDF] Cloud information accountability (cia) framework ensuring accountability of data in cloud and security in end to end process in cloud terminology
R Kalaiprasath, R Elankavi… - International Journal Of …, 2017 - researchgate.net
ABSTRACT A major feature of the cloud services is that users' data are usually processed
remotely in unknown machines that users do not own or operate. While enjoying the …
remotely in unknown machines that users do not own or operate. While enjoying the …