Ensuring distributed accountability for data sharing in the cloud

S Sundareswaran, A Squicciarini… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. A major feature of the cloud services is that users' data are usually …

Audit-based compliance control

JG Cederquist, R Corin, MAC Dekker, S Etalle… - International Journal of …, 2007 - Springer
In this paper we introduce a new framework for controlling compliance to discretionary
access control policies [Cederquist et al. in Proceedings of the International Workshop on …

Promoting distributed accountability in the cloud

S Sundareswaran, A Squicciarini… - 2011 IEEE 4th …, 2011 - ieeexplore.ieee.org
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. A major feature of the cloud services is that users' data is usually …

Audit-based access control for electronic health records

MAC Dekker, S Etalle - Electronic notes in theoretical computer science, 2007 - Elsevier
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, ie
before granting a request for a document. There are scenarios however where the security …

Accountability in computing: concepts and mechanisms

J Feigenbaum, AD Jaggard… - Foundations and Trends …, 2020 - nowpublishers.com
Accountability is a widely studied but amorphous concept, used to mean different things
across different disciplines and domains of application. Here, we survey work on …

The financial auditing of distributed ledgers, blockchain and cryptocurrencies

D Broby, G Paul - Journal of financial transformation, 2017 - pureportal.strath.ac.uk
The internet and digital transfer of money is set to fundamentally change the way financial
audits are conducted. This paper critically assesses the way that such assets are currently …

An audit logic for accountability

JG Cederquist, R Conn, MAC Dekker… - … on Policies for …, 2005 - ieeexplore.ieee.org
We describe a policy language and implement its associated proof checking system. In our
system, agents can distribute data along with usage policies in a decentralized architecture …

Correct audit logging: Theory and practice

S Amir-Mohammadian, S Chong, C Skalka - … , POST 2016, Held as Part of …, 2016 - Springer
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …

[PDF][PDF] A PROFICIENT MODEL FOR HIGH END SECURITY IN CLOUD COMPUTING.

RB Chandar, MS Kavitha… - ICTACT journal on soft …, 2014 - pdfs.semanticscholar.org
Cloud computing is an inspiring technology due to its abilities like ensuring scalable
services, reducing the anxiety of local hardware and software management associated with …

[PDF][PDF] Cloud information accountability (cia) framework ensuring accountability of data in cloud and security in end to end process in cloud terminology

R Kalaiprasath, R Elankavi… - International Journal Of …, 2017 - researchgate.net
ABSTRACT A major feature of the cloud services is that users' data are usually processed
remotely in unknown machines that users do not own or operate. While enjoying the …