Improvement of role-based access control model in private cloud environments
Currently, cloud technologies are gaining in popularity. This is due to the rapid development of the Internet and related technologies. Currently, there are several types of clouds - generic, public, private and hybrid, each performing different tasks and meeting different requirements. Usually, org...
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | Volynets, O. Yu., Kulish, D. V., Pryimak, A. V., Yaremchuk, Ya. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2019
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/199370 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Improvement of role-based access control model in private cloud environments
by: Yu. Volynets, et al.
Published: (2019)
by: Yu. Volynets, et al.
Published: (2019)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
Research and development workstation environment: the new class of Current Research Information Systems
by: Palagin, O.V., et al.
Published: (2018)
by: Palagin, O.V., et al.
Published: (2018)
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)
by: Боярінова, Ю. Є., et al.
Published: (2025)
Detection and isolation of affected elements in a cloud-deployed computer system
by: Ардашов, Д. С.
Published: (2025)
by: Ардашов, Д. С.
Published: (2025)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
On the way to creating Ukrainian national cloud of open science
by: Svistunov, S.Ya., et al.
Published: (2021)
by: Svistunov, S.Ya., et al.
Published: (2021)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Cloud service for authentication of a person based on their electrocardiogram
by: Luhovskyi, Yu.O.
Published: (2023)
by: Luhovskyi, Yu.O.
Published: (2023)
POWER DESCRIPTIONS OF A STORM CLOUD OF TROPOSPHERE OF EARTH: FEATURES OF THEIR CALCULATION AND APPLIED UTILIZATION
by: Baranov, M. I.
Published: (2018)
by: Baranov, M. I.
Published: (2018)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Порівняння використання Apache OpenWhisk та Google Cloud Functions для розроблення безсерверних застосункiв на базі Google Cloud Platform
by: Kondratiuk, Taras, et al.
Published: (2021)
by: Kondratiuk, Taras, et al.
Published: (2021)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Global open access resource aggregation services and their requirements for data providers
by: Proskudina, G.Yu., et al.
Published: (2024)
by: Proskudina, G.Yu., et al.
Published: (2024)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Overview of global open access resource aggregation services and their requirements for data providers
by: Proskudina, G.Yu., et al.
Published: (2025)
by: Proskudina, G.Yu., et al.
Published: (2025)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
Application of small language models for semantic analysis of Web interface accessibility
by: Kuzikov, B.O., et al.
Published: (2025)
by: Kuzikov, B.O., et al.
Published: (2025)
Monitoring of potential self-ignition zones of the forest according to cloud cover remote sensing data
by: Krasovska, I.G., et al.
Published: (2018)
by: Krasovska, I.G., et al.
Published: (2018)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
A research of invisible errors in bibliographic data input and its impact on the quality and search accessibility
by: Петренко , М. В.
Published: (2021)
by: Петренко , М. В.
Published: (2021)
To the issue of optimizing cloud computing based on their cost
by: Doroshenko, А.Yu., et al.
Published: (2021)
by: Doroshenko, А.Yu., et al.
Published: (2021)
Transformation of the legacy code on Fortran for scalability and cloud computing
by: Doroshenko, A.Yu., et al.
Published: (2018)
by: Doroshenko, A.Yu., et al.
Published: (2018)
CLOUD LINEAMENTS – INDICATORS OF FAULT ZONES OF THE EARTH
by: Shatalov, N.N.
Published: (2019)
by: Shatalov, N.N.
Published: (2019)
Cloud service provider selection using reinforcement learning approach and providers’ reputation
by: Myroshnikova, I. Yu., et al.
Published: (2014)
by: Myroshnikova, I. Yu., et al.
Published: (2014)
Improvement of the method of semiotic analysis of materials for detection of informational-psychological impact
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
Defining of cloud service priority for dynamic creating WAF rules
by: Malinich, I.P., et al.
Published: (2026)
by: Malinich, I.P., et al.
Published: (2026)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Methods and analytical conditions for adapting the provision of resources to users of cloud computing
by: Матов, О. Я.
Published: (2020)
by: Матов, О. Я.
Published: (2020)
Similar Items
-
Improvement of role-based access control model in private cloud environments
by: Yu. Volynets, et al.
Published: (2019) -
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018) -
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024) -
Research and development workstation environment: the new class of Current Research Information Systems
by: Palagin, O.V., et al.
Published: (2018) -
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)