Analysis of Key Technologies of Cloud Computing Security Based on Trust Model

2021 ◽  
pp. 404-412
Author(s):  
Fangfang Dang ◽  
Weijian Zhang ◽  
Shuai Li ◽  
Han Liu
2019 ◽  
Vol 16 (7) ◽  
pp. 174-194 ◽  
Author(s):  
Weijin Jiang ◽  
Yang Wang ◽  
Yirong Jiang ◽  
Jiahui Chen ◽  
Yuhui Xu ◽  
...  

Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.


2020 ◽  
Vol 33 (3) ◽  
pp. 133
Author(s):  
Deepak Garg ◽  
Jagpreet Sidhu ◽  
Shalli Rani

Author(s):  
Abdulhafid Bughari Abdulkarim Abdulgadr ◽  
Abdullah Khalifa Mohamed Hamad ◽  
Mansour Khalifa Hamad Mohamed

2017 ◽  
Vol 54 ◽  
pp. 1-2 ◽  
Author(s):  
Yong Yu ◽  
Atsuko Miyaji ◽  
Man Ho Au ◽  
Willy Susilo

Sign in / Sign up

Export Citation Format

Share Document