The development private information security policy in the cloud computing system
Keywords:
cloud computing system, private information security policy, role based access control, role hierarchy.Abstract
The development private information security policy in the cloud computing system is discussed. A mathematical model of role-based access control is proposed to use the algorithm is described. The sets of access objects and access subjects to cloud computing system are defined. The possibilities list for objects access and access subjects, which can be basis for development security policies in cloud computing system, are defined.Downloads
Published
2018-22-06
Issue
Section
INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT