<--- Back to Details
First PageDocument Content
Computer access control / Java platform / Archive formats / Log file / JAR / Authentication / Cloud computing security / Logger / Data logger / Login / Oracle Database / Log4j
Date: 2015-04-03 16:07:48
Computer access control
Java platform
Archive formats
Log file
JAR
Authentication
Cloud computing security
Logger
Data logger
Login
Oracle Database
Log4j

Promoting Distributed Accountability in the Cloud

Add to Reading List

Source URL: cs.mst.edu

Download Document from Source Website

File Size: 296,01 KB

Share Document on Facebook

Similar Documents

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

DocID: 1voGj - View Document

Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

DocID: 1vgjd - View Document

Access Control and Key Management for Mobile Agents Volker Roth 1 and Mehrdad Jalali-Sohi 2 Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany

DocID: 1vfkA - View Document

Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

DocID: 1uYGS - View Document

Verification of agent knowledge in dynamic access control policies∗ Masoud Koleini, Eike Ritter and Mark Ryan School of Computer Science The University of Birmingham Birmingham, B15 2TT, UK

DocID: 1uPvL - View Document