Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1732
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | De, Sourya Joyee | |
dc.contributor.author | Pal, Asim Kumar | |
dc.date.accessioned | 2021-08-26T06:23:47Z | - |
dc.date.available | 2021-08-26T06:23:47Z | - |
dc.date.issued | 2014 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84902276005&doi=10.1109%2fHICSS.2014.613&partnerID=40&md5=f75880acf61500372adff50e231bf68b | |
dc.identifier.uri | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1732 | - |
dc.description | De, Sourya Joyee, Management Information Systems Group, Indian Institute of Management, Calcutta, India; Pal, Asim Kumar, Management Information Systems Group, Indian Institute of Management, Calcutta, India | |
dc.description | ISSN/ISBN - 15301605 | |
dc.description | pp.4986-4997 | |
dc.description | DOI - 10.1109/HICSS.2014.613 | |
dc.description.abstract | A whole range of security concerns that can act as barriers to the adoption of cloud computing have been identified by researchers over the last few years. While outsourcing its business-critical data and computations to the cloud, an enterprise loses control over them. How should the organization decide what security measures to apply to protect its data and computations that have different security requirements from a Cloud Service Provider (CSP) with an unknown level of corruption? The answer to this question relies on th e organization's perception about the CSP's trustworthiness and the security requirements of its data. This paper proposes a decentralized, dynamic and evolving policy-based security framework that helps an organization to derive such perceptions from knowledgeable and trusted employee roles and based on that, choose the most relevant security policy specifying the security measures necessary for outsourcing data and computations to the cloud. The organizational perception is built through direct user participation and is allowed to evolve over time. © 2014 IEEE. | |
dc.publisher | SCOPUS | |
dc.publisher | Proceedings of the Annual Hawaii International Conference on System Sciences | |
dc.publisher | IEEE Computer Society | |
dc.subject | Data Integrity | |
dc.subject | Auditing | |
dc.subject | Random Oracle Model | |
dc.title | A policy-based security framework for storage and computation on enterprise data in the cloud | |
dc.type | Conference Paper | |
Appears in Collections: | Management Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.