Back to Results
First PageMeta Content
Access control / Windows Server / Role-based access control / Virtual machines / Hyper-V / PERMIS / Social vulnerability / Logical partition / Cloud computing / System software / Security / Computing


CERIAS Tech Report[removed]Risk-Aware Virtual Resource Management for Access Control-Based Cloud Datacenters by Abdulrahman Almutairi, Arif Ghafoor Center for Education and Research Information Assurance and Security Purd
Add to Reading List

Document Date: 2014-07-31 11:03:37


Open Document

File Size: 1,91 MB

Share Result on Facebook

City

Sharing / Access Control / /

Company

Ipl / Amazon / VRM ACM Users / Yahoo / /

Currency

pence / /

Facility

Security Purdue University / Purdue University / /

IndustryTerm

step algorithm / security configuration / software vulnerability / software stack / role mining techniques / customers applications / security analysis tools / assignment algorithm / role mining / e-government / computing / healthcare / cloud computing / virtualization software / shared software / customer data centric applications / steps algorithm / big data applications / /

OperatingSystem

VMs / /

Organization

Department of Electrical and Computer Engineering / Purdue University / Arif Ghafoor Center for Education and Research Information Assurance / /

Person

Arif Ghafoor / SING S PECTRAL / /

Position

Virtual Resource Manager / spectral representation model of RBAC policy / Travel Salesman / Rt / min Rt / words Rt / /

ProgrammingLanguage

L / R / C / /

ProvinceOrState

Indiana / /

Technology

assignment algorithm / virtual machine / PBH algorithm / 20 5 Algorithm / two steps algorithm / simulation / two step algorithm / /

URL

http /

SocialTag