Formal verification of secure information flow in cloud computing
- Submitting institution
-
Liverpool Hope University
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- fVG11C
- Type
- D - Journal article
- DOI
-
10.1016/j.jisa.2016.03.002
- Title of journal
- Journal of Information Security and Applications
- Article number
- -
- First page
- 103
- Volume
- 27-28
- Issue
- -
- ISSN
- 2214-2126
- Open access status
- Compliant
- Month of publication
- May
- Year of publication
- 2016
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
3
- Research group(s)
-
I - Intelligent and Distributed Systems (IDS)
- Citation count
- 11
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This research was supported by the 973 Program Grant 2010CB328102, NSFC Grant 61133001, and EPSRC UNCOVER project in which V Germanos was involved.
The benefit of this study is: one can apply Petri nets relevant techniques to analyse the security properties in cloud computing systems. This methodology has been used by RedHat Newcastle to analyse workflow security in distributed systems.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -