{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:34:43Z","timestamp":1725593683357},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_16","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T22:07:06Z","timestamp":1309212426000},"page":"130-137","source":"Crossref","is-referenced-by-count":16,"title":["Policy Based Management for Security in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Waller","sequence":"first","affiliation":[]},{"given":"Ian","family":"Sandy","sequence":"additional","affiliation":[]},{"given":"Eamonn","family":"Power","sequence":"additional","affiliation":[]},{"given":"Efthimia","family":"Aivaloglou","sequence":"additional","affiliation":[]},{"given":"Charalampos","family":"Skianis","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Ma\u00f1a","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Software as a Service Market Will Expand Rather than Contract Despite the Economic Crisis, IDC Finds (January 2009), http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS21641409 (accessed March 2010)"},{"key":"16_CR2","unstructured":"Robinson, J.J.: Demand for software-as-a-service still growing (May 2009), http:\/\/www.information-age.com\/channels\/commsand-networking\/perspectives-and-trends\/1046687\/demand-forsoftwareasaservice-still-growing.thtml (accessed March 2010)"},{"key":"16_CR3","unstructured":"PASSIVE project, http:\/\/ict-passive.eu\/"},{"key":"16_CR4","unstructured":"http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/ (July 10, 2009)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Chapin, P.C., Shalka, C., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Comput. Surv.\u00a040(3), Article 9 (August 2008)","DOI":"10.1145\/1380584.1380587"},{"issue":"1","key":"16_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., De Capitani Di Vimercati, S., Samarati, P.: An Algebra for Composing Access Control Policies. ACM Trans. Inf. Syst. Secur.\u00a05(1), 1\u201335 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Inglesant, P., Sasse, M.A., Chadwick, D., Shi, L.L.: Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification. In: Symposium On Usable Privacy and Security (SOUPS) 2008, Pittsburgh, PA, USA, July 23-25 (2008)","DOI":"10.1145\/1408664.1408675"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Dunlop, N., Indulska, J., Raymond, K.: Methods for Conflict Resolution in Policy-Based Management Systems. In: Proceedings of the 7th International Conference on Enterprise Distributed Object Computing (EDOC 2003), pp. 1\u201312 (2003)","DOI":"10.1109\/EDOC.2003.1233841"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Chadha, R.: A Cautionary Note about Policy Conflict Resolution. In: Proc. IEEE Military Comms Conference 2006, MILCOM 2006, Washington, DC, October 23-25 (2006)","DOI":"10.1109\/MILCOM.2006.302500"},{"key":"16_CR10","unstructured":"Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: Traps, Events, Emulation, and Enforcement: Managing the Yin and Yang of Virtualization-based Security. In: VMSEC 2008, Fairfax, Virginia, USA, pp. 49\u201358 (October 31, 2008)"},{"key":"16_CR11","unstructured":"Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. IBM Research Report RC23511, 2005 (2005)"},{"key":"16_CR12","unstructured":"Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D., Lepreau, J.: The flask security architecture: system support for diverse security policies. In: Proceedings of the 8th Conference on USENIX Security Symposium, vol.\u00a08 (1999)"},{"key":"16_CR13","unstructured":"Kuhlmann, D., Landfermann, R., Ramasamy, H. V., Schunter, M., Ramunno, G., Vernizzi, D.: An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-Defined Policy Enforcement. OpenTC report, 2006 (2006)"},{"issue":"7","key":"16_CR14","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1278901.1278905","volume":"41","author":"A.D. Payne","year":"2007","unstructured":"Payne, A.D., Sailer, R., C\u00e1ceres, R., Perez, R., Lee, W.: A layered approach to simplified access control in virtualized systems. ACM SIGOPS Operating Systems Review\u00a041(7), 12\u201319 (2007)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Jaeger, T., Berger, S., Caceres, R., Sailer, R.: Shamon: A System for Distributed Mandatory Access Control. In: Computer Security Applications Conference, pp. 23\u201332 (2006)","DOI":"10.1109\/ACSAC.2006.47"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1341312.1341321","volume":"42","author":"S. Berger","year":"2008","unstructured":"Berger, S., C\u00e1ceres, R., Pendarakis, D., Sailer, R., Valdez, E., Perez, R., Schildhauer, W., Srinivasan, D.: TVDc: Managing Security in the Trusted Virtual Datacenter. ACM SIGOPS Operating Systems Review\u00a042(1), 40\u201347 (2008)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"16_CR17","unstructured":"Bussani, A., Griffin, J.L., Jansen, B., Julisch, K., Karjoth, G., Maruyama, H., Nakamura, M., Perez, R., Schunter, M., Tanner, A., van Doorn, L., Herreweghen, E.V., Waidner, M., Yoshihama, S.: Trusted Virtual Domains: Secure foundation for business and IT services, Research Report RC 23792, IBM Research (November 2005)"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-540-30144-8_20","volume-title":"Information Security","author":"A. Chander","year":"2004","unstructured":"Chander, A., Dean, D., Mitchell, J.C.: A distributed high assurance reference monitor. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 231\u2013244. Springer, Heidelberg (2004)"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-75698-9_17","volume-title":"International Symposium on Fundamentals of Software Engineering","author":"C. Montangero","year":"2007","unstructured":"Montangero, C., Reiff-Marganiec, S., Semini, L.: Logic\u2013Based Detection of Conflicts in Appel Policies. In: Arbab, F., Sirjani, M. (eds.) FSEN 2007. LNCS, vol.\u00a04767, pp. 257\u2013271. Springer, Heidelberg (2007)"},{"key":"16_CR20","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: Ponder: A Language for Specifying Security and Management Policies for Distributed Systems. The Language Specification Version 2.3. Imperial College Research Report DoC 2000\/1 (October 20, 2000)"},{"key":"16_CR21","unstructured":"OASIS website (February 2011), http:\/\/www.oasis-open.org"},{"issue":"4","key":"16_CR22","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X. Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM Trans. Inf. Syst. Secur.\u00a08(4), 351\u2013387 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Alvaro, A., de Almeida, E.S., de Lemos Meira, S.R.: Software component certification: A survey. In: Proc. of 31st EUROMICRO Conference on Software Engineering and Advanced Applications, Porto, Portugal (August\u2013September 2005)","DOI":"10.1109\/EUROMICRO.2005.52"},{"key":"16_CR24","unstructured":"Common Criteria for Information Technology Security Evaluation, ISO\/IEC Standard 15408, version 3.1(2008)"},{"key":"16_CR25","unstructured":"ASSERT4SOA Project (March 2011), http:\/\/www.assert4soa.eu\/"},{"key":"16_CR26","unstructured":"Davy, S., Jennings, B., Strassner, J.: The Policy Continuum - A Formal Model. In: Proc. Modelling Autonomic Communications Environments, Multlicon, Multicon, Berlin. Lecture Notes, vol.\u00a06, pp. 65\u201378 (2007)"},{"key":"16_CR27","unstructured":"AUTOI ICT-216404, Deliverable D4.1 - Initial Management Plane (December 2008)"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T08:25:13Z","timestamp":1560327913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}