Improvement of role-based access control model in private cloud environments
Currently, cloud technologies are gaining in popularity. This is due to the rapid development of the Internet and related technologies. Currently, there are several types of clouds - generic, public, private and hybrid, each performing different tasks and meeting different requirements. Usually, org...
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | Volynets, O. Yu., Kulish, D. V., Pryimak, A. V., Yaremchuk, Ya. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2019
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/199370 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Improvement of role-based access control model in private cloud environments
by: Yu. Volynets, et al.
Published: (2019)
by: Yu. Volynets, et al.
Published: (2019)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)
by: Боярінова, Ю. Є., et al.
Published: (2025)
Research and development workstation environment: the new class of Current Research Information Systems
by: Palagin, O.V., et al.
Published: (2018)
by: Palagin, O.V., et al.
Published: (2018)
Detection and isolation of affected elements in a cloud-deployed computer system
by: Ардашов, Д. С.
Published: (2025)
by: Ардашов, Д. С.
Published: (2025)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
On the way to creating Ukrainian national cloud of open science
by: Svistunov, S.Ya., et al.
Published: (2021)
by: Svistunov, S.Ya., et al.
Published: (2021)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Cloud service for authentication of a person based on their electrocardiogram
by: Luhovskyi, Yu.O.
Published: (2023)
by: Luhovskyi, Yu.O.
Published: (2023)
POWER DESCRIPTIONS OF A STORM CLOUD OF TROPOSPHERE OF EARTH: FEATURES OF THEIR CALCULATION AND APPLIED UTILIZATION
by: Baranov, M. I.
Published: (2018)
by: Baranov, M. I.
Published: (2018)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Порівняння використання Apache OpenWhisk та Google Cloud Functions для розроблення безсерверних застосункiв на базі Google Cloud Platform
by: Kondratiuk, Taras, et al.
Published: (2021)
by: Kondratiuk, Taras, et al.
Published: (2021)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Global open access resource aggregation services and their requirements for data providers
by: Proskudina, G.Yu., et al.
Published: (2024)
by: Proskudina, G.Yu., et al.
Published: (2024)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Risk-adaptive authorization in zero trust with dynamic trust and tokens
by: Kostiuk, Yu.V., et al.
Published: (2026)
by: Kostiuk, Yu.V., et al.
Published: (2026)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
Overview of global open access resource aggregation services and their requirements for data providers
by: Proskudina, G.Yu., et al.
Published: (2025)
by: Proskudina, G.Yu., et al.
Published: (2025)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Application of small language models for semantic analysis of Web interface accessibility
by: Kuzikov, B.O., et al.
Published: (2025)
by: Kuzikov, B.O., et al.
Published: (2025)
Monitoring of potential self-ignition zones of the forest according to cloud cover remote sensing data
by: Krasovska, I.G., et al.
Published: (2018)
by: Krasovska, I.G., et al.
Published: (2018)
A research of invisible errors in bibliographic data input and its impact on the quality and search accessibility
by: Петренко , М. В.
Published: (2021)
by: Петренко , М. В.
Published: (2021)
To the issue of optimizing cloud computing based on their cost
by: Doroshenko, А.Yu., et al.
Published: (2021)
by: Doroshenko, А.Yu., et al.
Published: (2021)
Transformation of the legacy code on Fortran for scalability and cloud computing
by: Doroshenko, A.Yu., et al.
Published: (2018)
by: Doroshenko, A.Yu., et al.
Published: (2018)
Improvement of the method of semiotic analysis of materials for detection of informational-psychological impact
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
CLOUD LINEAMENTS – INDICATORS OF FAULT ZONES OF THE EARTH
by: Shatalov, N.N.
Published: (2019)
by: Shatalov, N.N.
Published: (2019)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Ways to improve the environmental safety of the urbanized environment in connection with the Covid-19
by: Kryvomaz, Тetiana I., et al.
Published: (2020)
by: Kryvomaz, Тetiana I., et al.
Published: (2020)
Cloud service provider selection using reinforcement learning approach and providers’ reputation
by: Myroshnikova, I. Yu., et al.
Published: (2014)
by: Myroshnikova, I. Yu., et al.
Published: (2014)
Similar Items
-
Improvement of role-based access control model in private cloud environments
by: Yu. Volynets, et al.
Published: (2019) -
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018) -
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024) -
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025) -
Research and development workstation environment: the new class of Current Research Information Systems
by: Palagin, O.V., et al.
Published: (2018)