J-STAGE Home  >  Publications - Top  > Bibliographic Information

Journal of Information Processing
Vol. 24 (2016) No. 2 pp. 371-380



  • [1] Mell, P. and Grance, T.: The NIST definition of cloud computing (2011).
  • [2] Jason, P.O.: Horizontal integration: Broader access models for realising information dominance, Technical report, Report JSR-04-132, The MITRE Corporation, JASON Program Office, (2004), available from <http://fas.org/irp/agency/dod/jason/classpol.pdf> (2004).
  • [3] McGraw, R.: Risk adaptive access control (RAdAC), Proc. NIST & NSA Privilege Management Workshop (2009).
  • [4] Zadeh, L.A.: Fuzzy sets, Information and control, Vol.8, No.3, pp.338-353 (1965).
  • [5] Bell, D.E. and LaPadula, L.J.: Secure computer systems: Mathematical foundations, Technical report, DTIC Document (1973).
  • [6] Lindqvist, H.: Mandatory access control, Master's Thesis in Computing Science, Umea University, Department of Computing Science, SE-901, Vol.87 (2006).
  • [7] Downs, D.D., Rub, J.R., Kung, K.C. and Jordan, C.S.: Issues in discretionary access control, 2012 IEEE Symposium on Security and Privacy, pp.208-208, IEEE Computer Society (1985).
  • [8] Sandhu, R.S., Coyne, E.J., Feinstein, H.L. and Youman, C.E.: Role-based access control models, Computer, Vol.29, No.2, pp.38-47 (1996).
  • [9] Hu, V.C., Kuhn, D.R. and Ferraiolo, D.F.: Attribute-based access control, Computer, No.2, pp.85-88 (2015).
  • [10] Fall, D., Okuda, T., Kadobayashi, Y. and Yamaguchi, S.: Toward quantified risk-adaptive access control for multi-tenant cloud computing, pp.1-14 (2011) (online), available from <https://sites.google.com/site/jwis2011/program>.
  • [11] Santos, D.R.d., Westphall, C.M. and Westphall, C.B.: Risk-based dynamic access control for a highly scalable cloud federation, SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies, pp.8-13 (2013).
  • [12] Santos, D.R.d., Westphall, C.M. and Westphall, C.B.: A dynamic risk-based access control architecture for cloud computing, Network Operations and Management Symposium (NOMS), 2014 IEEE, pp.1-9, IEEE (2014).
  • [13] Rissanen, E.: Extensible access control markup language (xacml) version 3.0 (2013).
  • [14] Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M. and Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control, IEEE Symposium on Security and Privacy, 2007. SP'07, pp.222-230, IEEE (2007).
  • [15] Ni, Q., Bertino, E. and Lobo, J.: Risk-based access control systems built on fuzzy inferences, Proc. 5th ACM Symposium on Information, Computer and Communications Security, pp.250-260, ACM (2010).
  • [16] Burnett, C., Chen, L., Edwards, P. and Norman, T.J.: TRAAC: Trust and risk aware access control, 2014 12th Annual International Conference on Privacy, Security and Trust (PST), pp.371-378, IEEE (2014).
  • [17] Khambhammettu, H., Boulares, S., Adi, K. and Logrippo, L.: A framework for risk assessment in access control systems, Computers & Security, Vol.39, pp.86-103 (2013).
  • [18] Shaikh, R.A., Adi, K. and Logrippo, L.: Dynamic risk-based decision methods for access control systems, Computers & Security, Vol.31, No.4, pp.447-464 (2012).
  • [19] Hunter, J.S.: The exponentially weighted moving average, J. Quality Technol., Vol.18, No.4, pp.203-210 (1986).
  • [20] Celesti, A., Tusa, F., Villari, M. and Puliafito, A.: How to enhance cloud architectures to enable cross-federation, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp.337-345, IEEE (2010).
  • [21] Buyya, R., Ranjan, R. and Calheiros, R.N.: Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services, Algorithms and Architectures for Parallel Processing, pp.13-31, Springer (2010).
  • [22] Goiri, I., Guitart, J. and Torres, J.: Characterizing cloud federation for enhancing providers' profit, 2010 IEEE 3rd International Conference on Cloud Computing(CLOUD), pp.123-130, IEEE (2010).
  • [23] Recordon, D. and Reed, D.: OpenID 2.0: A platform for user-centric identity management, Proc. 2nd ACM Workshop on Digital Identity Management, pp.11-16, ACM (2006).
  • [24] Tang, B., Li, Q. and Sandhu, R.: A multi-tenant RBAC model for collaborative cloud services, 11th Annual International Conference on Privacy, Security and Trust (PST), pp.229-238, IEEE (2013).
  • [25] Computer Security Division: National Vulnerability Database, US National Institute of Standards and Technology (online), available from <http://www.nvd.nist.gov> (accessed 2014-09-10).
  • [26] Mell, P., Scarfone, K. and Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0, FIRST-Forum of Incident Response and Security Teams, pp.1-23 (2007).
Copyright © 2016 by the Information Processing Society of Japan

Article Tools

Share this Article