What admins should know about Microsoft Azure security and vulnerabilities. http://searchwindowsserver.techtarget.com/tip/What- admins-should-know-about-Microsoft-Azure-security ,
Why enterprises that value security trust Microsoft Azure ,
Vac - Verifier of Administrative Role-Based Access Control Policies, CAV, 2014. ,
DOI : 10.1007/978-3-319-08867-9_12
Security Analysis of Role-Based Access Control through Program Verification, 2012 IEEE 25th Computer Security Foundations Symposium, pp.113-125, 2012. ,
DOI : 10.1109/CSF.2012.28
Policy Analysis for Self-administrated Role-Based Access Control, TACAS, pp.432-447, 2013. ,
DOI : 10.1007/978-3-642-36742-7_30
URL : https://eprints.soton.ac.uk/344391/1/ARBACpruning%2520%25282%2529.pdf
Microsoft Azure Security, 2015. ,
The dirty dozen: 12 cloud security threats, 2016. ,
Mohawk, ACM Transactions on Information and System Security, vol.15, issue.4, p.18, 2013. ,
DOI : 10.1145/2445566.2445570
A role-based administration model for attributes, Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems, SRAS '12, pp.7-12, 2012. ,
DOI : 10.1145/2420936.2420938
Reachability analysis for role-based administration of attributes, Proceedings of the 2013 ACM workshop on Digital identity management, DIM '13, pp.73-84, 2013. ,
DOI : 10.1145/2517881.2517891
A conceptual framework for Group-Centric secure information sharing, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.384-387, 2009. ,
DOI : 10.1145/1533057.1533111
URL : http://www.list.gmu.edu/confrnc/asiaccs/p384-krishnan.pdf
Cloud security: A comprehensive guide to secure cloud computing, 2010. ,
Security analysis in role-based access control, 9th ACM SACMAT, pp.126-135, 2004. ,
DOI : 10.1145/990036.990058
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry, Future Generation Computer Systems, vol.80, 2016. ,
DOI : 10.1016/j.future.2016.01.006
Boosting Model Checking to Analyse Large ARBAC Policies, Security and Trust Management -8th International Workshop, STM, pp.273-288, 2012. ,
DOI : 10.1007/978-3-642-38004-4_18
Privacy Enhanced Access Control for Outsourced Data Sharing, International Conference on Financial Cryptography and Data Security, pp.223-238, 2012. ,
DOI : 10.1007/978-3-642-32946-3_17
EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing, International Journal of Computer Applications, vol.132, issue.14, pp.132-2015 ,
DOI : 10.5120/ijca2015907649
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing, 2015 IEEE Conference on Collaboration and Internet Computing (CIC), pp.28-35, 2015. ,
DOI : 10.1109/CIC.2015.38
Policy analysis for administrative role based access control, 19th IEEE Computer Security Foundations Workshop, pp.124-138, 2006. ,
DOI : 10.1016/j.tcs.2011.05.009
URL : https://doi.org/10.1016/j.tcs.2011.05.009
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.743-754, 2012. ,
DOI : 10.1109/TIFS.2011.2172209
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010. ,
DOI : 10.1109/INFCOM.2010.5462174
Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS, Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC '16, pp.82-89, 2016. ,
DOI : 10.1109/IRI.2015.71
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud, 2015 IEEE International Conference on Information Reuse and Integration, pp.419-426, 2015. ,
DOI : 10.1109/IRI.2015.71