Book section Open Access

Similarity Measure for Security Policies in Service Provider Selection

Li, Yanhuang; Cuppens-Boulahia, Nora; Crom, Jean-Michel; Cuppens, Frédéric; Frey, Vincent; Ji, Xiaoshu


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.55782</identifier>
  <creators>
    <creator>
      <creatorName>Li, Yanhuang</creatorName>
      <givenName>Yanhuang</givenName>
      <familyName>Li</familyName>
      <affiliation>Télécom Bretagne</affiliation>
    </creator>
    <creator>
      <creatorName>Cuppens-Boulahia, Nora</creatorName>
      <givenName>Nora</givenName>
      <familyName>Cuppens-Boulahia</familyName>
      <affiliation>Télécom Bretagne</affiliation>
    </creator>
    <creator>
      <creatorName>Crom, Jean-Michel</creatorName>
      <givenName>Jean-Michel</givenName>
      <familyName>Crom</familyName>
      <affiliation>Orange Labs</affiliation>
    </creator>
    <creator>
      <creatorName>Cuppens, Frédéric</creatorName>
      <givenName>Frédéric</givenName>
      <familyName>Cuppens</familyName>
      <affiliation>Télécom Bretagne</affiliation>
    </creator>
    <creator>
      <creatorName>Frey, Vincent</creatorName>
      <givenName>Vincent</givenName>
      <familyName>Frey</familyName>
      <affiliation>Orange Labs</affiliation>
    </creator>
    <creator>
      <creatorName>Ji, Xiaoshu</creatorName>
      <givenName>Xiaoshu</givenName>
      <familyName>Ji</familyName>
      <affiliation>Orange Labs</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Similarity Measure for Security Policies in Service Provider Selection</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2015</publicationYear>
  <dates>
    <date dateType="Issued">2015-12-31</date>
  </dates>
  <resourceType resourceTypeGeneral="BookChapter"/>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/55782</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsPartOf">10.1007/978-3-319-26961-0_14</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsSupplementedBy">10.5281/zenodo.60679</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/ecfunded</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/supercloud</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode">Creative Commons Attribution Non Commercial Share Alike 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;The interaction between different applications and services requires expressing their security properties. This is typically defined as security policies, which aim at specifying the diverse privileges of different actors. Today similarity measure for comparing security policies becomes a crucial technique in a variety of scenarios, such as finding the cloud service providers which satisfy client's security concerns. Existing approaches cover from semantic to numerical dimensions and the main work focuses mainly on XACML policies. However, few efforts have been made to extend the measure approach to multiple policy models and apply it to concrete scenarios. In this paper, we propose a generic and light-weight method to compare and evaluate security policies belonging to different models. Our technique enables client to quickly locate service providers with potentially similar policies. Comparing with other works, our approach takes policy elements' logic relationships into account and the experiment and implementation demonstrate the e ciency and accuracy of our approach.&lt;/p&gt;</description>
  </descriptions>
  <fundingReferences>
    <fundingReference>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/643964/">643964</awardNumber>
      <awardTitle>USER-CENTRIC MANAGEMENT OF SECURITY AND DEPENDABILITY IN CLOUDS OF CLOUDS</awardTitle>
    </fundingReference>
  </fundingReferences>
</resource>
72
152
views
downloads
All versions This version
Views 7272
Downloads 152152
Data volume 214.7 MB214.7 MB
Unique views 7070
Unique downloads 148148

Share

Cite as