MATEC Web Conf.
Volume 100, 201713th Global Congress on Manufacturing and Management (GCMM 2016)
|Number of page(s)||7|
|Section||Part 5: Management Engineering|
|Published online||08 March 2017|
A Security Architecture Research Based on Roles
1 School of Arts and sciences, Information Engineering University, Zhengzhou 450001, China
2 Shenyang NanChang High School, Shenyang 110002, China
* Corresponding author: email@example.com
Security has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, there are some common ground and new problems. In cloud computing environment, different users need different security requirements, so if we can assign them reasonable authority, there will be great efficiency improvement for data security and system efficiency. Role is an authority division and management method, it gains very good effect for its classification to user and data operations. Inspired by this, a security cloud computing architecture based on role has been designed, the security of the architecture has been evaluated at last.
© The Authors, published by EDP Sciences, 2017
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.