Lookup NU author(s): Professor Paul Watson,
Professor Mark Little
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
© 2014 IEEE.The deployment of the components of distributed systems is now often very dynamic - server-side components are virtualised so they can be dynamically deployed on a range of platforms including public and private clouds, while users expect to be able to install clients on devices from phones to tablets. This can introduce security problems that place data at risk. This paper describes a new method for modeling the security of a distributed application and generating the set of possible deployment options that meet the overall security requirements. The model encompasses the entities that influence the security of a distributed system: data, services networks and platforms (e.g. Clouds, devices and 'things'). The paper describes the method and how it can be used to answer a range of security questions, using a set of case studies including federated clouds and mobile clients.
Author(s): Watson P, Little M
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), 2014
Year of Conference: 2015
Online publication date: 12/02/2015
Acceptance date: 01/01/1900
Publisher: IEEE Computer Society