Mahowald, R.P., Sullivan, C.G., Konary, A.: Market Analysis Perspective: Worldwide SaaS and Cloud Services, 2012 — New Models for Delivering Software (2012),
http://www.idc.com/getdoc.jsp?containerId=238635#.UM4QauTqmuM
Media, M.R. Global Cloud Computing Market Forecast 2015-2020 (2012),
http://www.marketresearchmedia.com/?p=839
Gouglidis, A., Mavridis, I.: On the definition of access control requirements for grid and cloud computing systems. In: Doulamis, A., Mambretti, J., Tomkos, I., Varvarigou, T. (eds.) GridNets 2009. LNICST, vol. 25, pp. 19–26. Springer, Heidelberg (2010)
CrossRef
Google Scholar
Hansen, F., Oleshchuk, V.A.: Conformance checking of RBAC policy and its implementation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 144–155. Springer, Heidelberg (2005)
CrossRef
Google Scholar
Jayaraman, K., et al.: Automatic error finding in access-control policies. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM (2011)
Google Scholar
Vincent, C., et al.: Model checking for verification of mandatory access control models and properties. International Journal of Software Engineering and Knowledge Engineering 21(01), 103–127 (2011)
Google Scholar
Fisler, K., et al.: Verification and change-impact analysis of access-control policies. In: Proceedings of the 27th International Conference on Software Engineering. ACM (2005)
Google Scholar
Capitani di Vimercati, S., Foresti, S., Samarati, P.: Authorization and Access Control. In: Petković, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern Data Management, pp. 39–53. Springer, Heidelberg (2007)
CrossRef
Google Scholar
Sandhu, R.S., Samarati, P.: Access Control: Principles and Practice. IEEE Communications Magazine 32(9), 40–49 (1994)
CrossRef
Google Scholar
Foster, I., et al.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE 2008. IEEE (2008)
Google Scholar
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Inc. 292 (2009)
Google Scholar
Mell, P., Grance, T.: The NIST definition of cloud computing (draft), vol. 800, p. 145. NIST Special Publication (2011)
Google Scholar
Sommerville, I., Kotonya, G.: Requirements engineering: processes and techniques. John Wiley & Sons, Inc. (1998)
Google Scholar
Baier, C., Katoen, J.P.: Principles of model checking, vol. 26202649. MIT Press (2008)
Google Scholar
Heljanko, K.: Model Checking based Software Verification (2006),
http://iplu.vtt.fi/digitalo/modelchecking.pdf
Girard, A., Pappas, G.: Verification using simulation. Hybrid Systems: Computation and Control, 272–286 (2006)
Google Scholar
Stevens, R.: Systems engineering: coping with complexity. Pearson Education (1998)
Google Scholar
Gouglidis, A., Mavridis, I.: domRBAC: An access control model for modern collaborative systems. Computers & Security (2012)
Google Scholar
Tolone, W., et al.: Access control in collaborative systems. ACM Computing Surveys (CSUR) 37(1), 29–41 (2005)
CrossRef
Google Scholar
Gong, L., Qian, X.: Computational issues in secure interoperation. IEEE Transactions on Software Engineering 22(1), 43–52 (1996)
CrossRef
Google Scholar
Hu, V.C., Kuhn, D.R., Xie, T.: Property verification for generic access control models. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008. IEEE (2008)
Google Scholar
Kuhn, R., Lei, Y., Kacker, R.: Practical combinatorial testing: Beyond pairwise. IT Professional 10(3), 19–23 (2008)
CrossRef
Google Scholar
Hwang, J.H., et al.: ACPT: A tool for modeling and verifying access control policies. In: 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (2010)
Google Scholar