A
Abnormal behavior, 57
Absolute risk, 70
Access control, 32, 37, 38, 464–465
attribute-based, 464
in cloud data centers, 392–393
cloud security, 141–149, 233–234
of collaborative editing, 161–175
collaborative query execution and, 124–131
discretionary, 464
introduction to, 116–117, 141–142, 152–153
mandatory, 464
multilevel authentication, 146–147
pairwise authorizations, 120–122
sovereign joins and, 117, 119–120
user authentication/authorization, 196–197
user-based restrictions, 117
Access control list (ACL), 154, 227–228
Access patterns, ...
Get Cloud Computing Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.