Embodiments of the present invention relate to an approach for resolving and/or implementing policies based on layers of a network stack (e.g., cloud computing stack). Specifically, for a given policy that is being resolved, the system first evaluates the applicability of the policy to each ...
The structure of this paper is as follows: “Related work” section provides a concise overview of previous work on service broker policies in cloud computing, highlighting their advantages and challenges. In “Service broker policy problem” section, we have explained cloud computing service broker ...
In this section, we describe the implementation details of SVMS. First, we present the ACIR computation process. Second, based on the Chinese wall policy, we put forward the isolation rules. Third, we propose the VMs placement solution and migration calculated algorithm. 5.1. Computing the ACIR...
Cloud computing has completely revolutionized the concept of computing by providing users with always-accessible resources. In terms of computational, storage, bandwidth, and transmission costs, cloud technology offers its users an entirely new set of advantages and cost savings. Cross-cloud data migrati...
We remark that there has been no practical implementation of RGC on multi-party policy execution environment in the literature, at the time of this research. Also, in this paper, we construct the Privacy Aware Cross Tenant Access Control (PaCTAC) protocol for cross domain users. The protocol ...
Cloud computing is becoming very important framework to provide number of services like, data storage, computation, infrastructure, software etc .over internet through virtualization of systems. So, security of data in all those services needs to consider. Attacker can try to attack on data or comm...
Cloud Computing is rapidly emerging as the new information technology platform. It is, however, much more than simply a new set of technologies and busines
Addressing privacy: matching user requirements with implementation techniquesView more references Cited by (6) Privacy regulation aware service selection for multi-provision cloud service composition 2022, Future Generation Computer Systems Citation Excerpt : In our previous work, we [47] proposed a minimu...
If we have made the personal data public and are obliged to erase it, we are also obliged, taking account of available technology and the cost of implementation, to take reasonable steps, including technical measures, to inform controllers which are processing the personal data that you have ...
At this period, he worked for three years, as the Director of the Department of Virtual Education of University of Jendouba, where he coordinates and supervises the implementation of virtual education and training strategies with the Virtual University of Tunis (UVT). He is currently an ...