Please use this identifier to cite or link to this item: https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1732
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDe, Sourya Joyee
dc.contributor.authorPal, Asim Kumar
dc.date.accessioned2021-08-26T06:23:47Z-
dc.date.available2021-08-26T06:23:47Z-
dc.date.issued2014
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84902276005&doi=10.1109%2fHICSS.2014.613&partnerID=40&md5=f75880acf61500372adff50e231bf68b
dc.identifier.urihttps://ir.iimcal.ac.in:8443/jspui/handle/123456789/1732-
dc.descriptionDe, Sourya Joyee, Management Information Systems Group, Indian Institute of Management, Calcutta, India; Pal, Asim Kumar, Management Information Systems Group, Indian Institute of Management, Calcutta, India
dc.descriptionISSN/ISBN - 15301605
dc.descriptionpp.4986-4997
dc.descriptionDOI - 10.1109/HICSS.2014.613
dc.description.abstractA whole range of security concerns that can act as barriers to the adoption of cloud computing have been identified by researchers over the last few years. While outsourcing its business-critical data and computations to the cloud, an enterprise loses control over them. How should the organization decide what security measures to apply to protect its data and computations that have different security requirements from a Cloud Service Provider (CSP) with an unknown level of corruption? The answer to this question relies on th e organization's perception about the CSP's trustworthiness and the security requirements of its data. This paper proposes a decentralized, dynamic and evolving policy-based security framework that helps an organization to derive such perceptions from knowledgeable and trusted employee roles and based on that, choose the most relevant security policy specifying the security measures necessary for outsourcing data and computations to the cloud. The organizational perception is built through direct user participation and is allowed to evolve over time. © 2014 IEEE.
dc.publisherSCOPUS
dc.publisherProceedings of the Annual Hawaii International Conference on System Sciences
dc.publisherIEEE Computer Society
dc.subjectData Integrity
dc.subjectAuditing
dc.subjectRandom Oracle Model
dc.titleA policy-based security framework for storage and computation on enterprise data in the cloud
dc.typeConference Paper
Appears in Collections:Management Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.