Improvement of role-based access control model in private cloud environments
Currently, cloud technologies are gaining in popularity. This is due to the rapid development of the Internet and related technologies. Currently, there are several types of clouds - generic, public, private and hybrid, each performing different tasks and meeting different requirements. Usually, org...
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | Volynets, O. Yu., Kulish, D. V., Pryimak, A. V., Yaremchuk, Ya. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2019
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/199370 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)
by: Боярінова, Ю. Є., et al.
Published: (2025)
A research of invisible errors in bibliographic data input and its impact on the quality and search accessibility
by: Петренко , М. В.
Published: (2021)
by: Петренко , М. В.
Published: (2021)
Detection and isolation of affected elements in a cloud-deployed computer system
by: Ардашов, Д. С.
Published: (2025)
by: Ардашов, Д. С.
Published: (2025)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
POWER DESCRIPTIONS OF A STORM CLOUD OF TROPOSPHERE OF EARTH: FEATURES OF THEIR CALCULATION AND APPLIED UTILIZATION
by: Baranov, M. I.
Published: (2018)
by: Baranov, M. I.
Published: (2018)
On fibers and accessibility of groups acting on trees with inversions
by: Mahmood, Rasheed Mahmood Saleh
Published: (2015)
by: Mahmood, Rasheed Mahmood Saleh
Published: (2015)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021)
by: Азарова, А. О., et al.
Published: (2021)
Порівняння використання Apache OpenWhisk та Google Cloud Functions для розроблення безсерверних застосункiв на базі Google Cloud Platform
by: Kondratiuk, Taras, et al.
Published: (2021)
by: Kondratiuk, Taras, et al.
Published: (2021)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
CLOUD LINEAMENTS – INDICATORS OF FAULT ZONES OF THE EARTH
by: Shatalov, N.N.
Published: (2019)
by: Shatalov, N.N.
Published: (2019)
Methods and analytical conditions for adapting the provision of resources to users of cloud computing
by: Матов, О. Я.
Published: (2020)
by: Матов, О. Я.
Published: (2020)
Monitoring of potential self-ignition zones of the forest according to cloud cover remote sensing data
by: Krasovska, I.G., et al.
Published: (2018)
by: Krasovska, I.G., et al.
Published: (2018)
Cloud service provider selection using reinforcement learning approach and providers’ reputation
by: Myroshnikova, I. Yu., et al.
Published: (2014)
by: Myroshnikova, I. Yu., et al.
Published: (2014)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Ways to improve the environmental safety of the urbanized environment in connection with the Covid-19
by: Kryvomaz, Тetiana I., et al.
Published: (2020)
by: Kryvomaz, Тetiana I., et al.
Published: (2020)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Displays of clouds anomalies on the sattelite images before strong earthquakes
by: Vorobiov, Anatolii, et al.
Published: (2016)
by: Vorobiov, Anatolii, et al.
Published: (2016)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Prognosis models of nitrates and orthophosphates content in surface waters
by: Mitryasova, Olena P., et al.
Published: (2022)
by: Mitryasova, Olena P., et al.
Published: (2022)
Optimization of the provision of computing resources with adaptive cloud infrastructure
by: Matov, О. Ya.
Published: (2018)
by: Matov, О. Ya.
Published: (2018)
Satellite monitoring of clouds over deep fault zones, short-term earthquake forecast and seismic activity in Ukraine
by: Vorobiov, Anatolii, et al.
Published: (2019)
by: Vorobiov, Anatolii, et al.
Published: (2019)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Conditions of formation of ferruginous rocks of the Krivoy Rog-Kremenchug zone
by: Usenko, O.
Published: (2015)
by: Usenko, O.
Published: (2015)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Similar Items
-
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024) -
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015) -
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025) -
A research of invisible errors in bibliographic data input and its impact on the quality and search accessibility
by: Петренко , М. В.
Published: (2021) -
Detection and isolation of affected elements in a cloud-deployed computer system
by: Ардашов, Д. С.
Published: (2025)