Options
Emadinia, Tayyebe
Loading...
Preferred name
Emadinia, Tayyebe
Official Name
Emadinia, Tayyebe
Alternative Name
Emadinia, T.
Scopus Author ID
57204466125
Now showing 1 - 2 of 2
2018Conference Paper [["dc.bibliographiccitation.firstpage","160"],["dc.bibliographiccitation.lastpage","165"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.contributor.author","Emadinia, Tayyebe"],["dc.date.accessioned","2019-01-25T07:49:57Z"],["dc.date.available","2019-01-25T07:49:57Z"],["dc.date.issued","2018"],["dc.description.abstract","One of the most challenging obstacles for the advancement of clouds is the lack of assurance and transparency, along with the current paucity of techniques to quantify security. A fundamental requirement for solving this problem is to provide proper levels of security based on the requirements of cloud customers and sensitivity of data. However, generating these security levels only partially serves the requirements of cloud customers especially if it's not linked to the management of SLC commitments. Accordingly, a novel approach has been proposed in this paper to define and manage security indicators in the generated security levels. These indicators are used to react to eventualities that may threaten the established mechanisms of the generated security rings, to ensure the fulfillment of agreed assurance levels, and to minimize the damages in case of attacks, unpredictable events or unavoidable changes. The proposed schema uses simultaneous monitoring with two different stand-alone agents per security level. These agents are initialized based on all security policies in the SLA to enhance the process of monitoring and rectification and to increase the rate of satisfaction and reliability in clouds."],["dc.identifier.doi","10.1109/ICIS.2018.8466452"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57372"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","17th International Conference on Computer and Information Science (ICIS)"],["dc.relation.eventend","2018-06-08"],["dc.relation.eventlocation","Singapore, Singapore"],["dc.relation.eventstart","2018-06-06"],["dc.relation.isbn","978-1-5386-5892-5"],["dc.relation.ispartof","2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","A Novel Approach to Define and Manage Security Indicators for the Fulfillment of Agreed Assurance Levels in Clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2018Conference Paper [["dc.bibliographiccitation.firstpage","108"],["dc.bibliographiccitation.lastpage","113"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Emadinia, Tayyebe"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-01-25T08:04:08Z"],["dc.date.available","2019-01-25T08:04:08Z"],["dc.date.issued","2018"],["dc.description.abstract","Cloud Computing and its' security and privacy concerns as well as countermeasures are one of the highly debated topics in today's IT industry. One of the most challenging security issues in clouds is to define and manage different levels according to isolation, service delivery and scalability concepts in clouds. These security levels need to be protected from disclosing to unauthorized users. Policy-Management models are the most appropriate solutions to create and manage security levels in clouds. However, these models increase the process of matching access requests to defined policies considerably. In this paper, we proposed a reliable access management framework based on multi-level policies and sequences. The suggested model introduces each level of security as s sequence according to the inheritance concepts to classify security levels efficiently and to enhance the process of access control by elimination of un-necessary re-matching. our results showed the suggested model is able to decrease the access response time without affecting the security of the environments."],["dc.identifier.doi","10.1109/FiCloud.2018.00023"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57374"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)"],["dc.relation.eventend","2018-08-08"],["dc.relation.eventlocation","Barcelona, Spain"],["dc.relation.eventstart","2018-08-06"],["dc.relation.isbn","978-1-5386-7503-8"],["dc.relation.ispartof","2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","A Sequence-Based Access Control Framework for Reliable Security Management in Clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI