Book section Open Access

Similarity Measure for Security Policies in Service Provider Selection

Li, Yanhuang; Cuppens-Boulahia, Nora; Crom, Jean-Michel; Cuppens, Frédéric; Frey, Vincent; Ji, Xiaoshu


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <controlfield tag="005">20200120173648.0</controlfield>
  <controlfield tag="001">55782</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">16-20 December 2015</subfield>
    <subfield code="g">ICISS2015</subfield>
    <subfield code="a">11th International Conference on Information Systems Security</subfield>
    <subfield code="c">Kolkata, India</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Télécom Bretagne</subfield>
    <subfield code="a">Cuppens-Boulahia, Nora</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Orange Labs</subfield>
    <subfield code="a">Crom, Jean-Michel</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Télécom Bretagne</subfield>
    <subfield code="a">Cuppens, Frédéric</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Orange Labs</subfield>
    <subfield code="a">Frey, Vincent</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Orange Labs</subfield>
    <subfield code="a">Ji, Xiaoshu</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">1412566</subfield>
    <subfield code="z">md5:77535f01c45ad26d38c1c9dc2cbd709a</subfield>
    <subfield code="u">https://zenodo.org/record/55782/files/SC-Similarity-Measure-for-Security-Policies-in-Service-Provider-Selection.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="y">Conference website</subfield>
    <subfield code="u">http://www.iciss.org.in/iciss-2015/default.htm</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2015-12-31</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="p">user-ecfunded</subfield>
    <subfield code="p">user-supercloud</subfield>
    <subfield code="o">oai:zenodo.org:55782</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Télécom Bretagne</subfield>
    <subfield code="a">Li, Yanhuang</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Similarity Measure for Security Policies in Service Provider Selection</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-ecfunded</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-supercloud</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">643964</subfield>
    <subfield code="a">USER-CENTRIC MANAGEMENT OF SECURITY AND DEPENDABILITY IN CLOUDS OF CLOUDS</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution Non Commercial Share Alike 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;The interaction between different applications and services requires expressing their security properties. This is typically defined as security policies, which aim at specifying the diverse privileges of different actors. Today similarity measure for comparing security policies becomes a crucial technique in a variety of scenarios, such as finding the cloud service providers which satisfy client's security concerns. Existing approaches cover from semantic to numerical dimensions and the main work focuses mainly on XACML policies. However, few efforts have been made to extend the measure approach to multiple policy models and apply it to concrete scenarios. In this paper, we propose a generic and light-weight method to compare and evaluate security policies belonging to different models. Our technique enables client to quickly locate service providers with potentially similar policies. Comparing with other works, our approach takes policy elements' logic relationships into account and the experiment and implementation demonstrate the e ciency and accuracy of our approach.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isPartOf</subfield>
    <subfield code="a">10.1007/978-3-319-26961-0_14</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isSupplementedBy</subfield>
    <subfield code="a">10.5281/zenodo.60679</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="b">Springer International Publishing</subfield>
    <subfield code="z">978-3-319-26960-3</subfield>
    <subfield code="t">Information Systems Security</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.55782</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">section</subfield>
  </datafield>
</record>
72
152
views
downloads
All versions This version
Views 7272
Downloads 152152
Data volume 214.7 MB214.7 MB
Unique views 7070
Unique downloads 148148

Share

Cite as