Published: November 1, 2018
Citation: Computer (IEEE Computer) vol. 51, no. 10, (October 2018) pp. 100-103
Author(s)
Vincent Hu (NIST), Richard Kuhn (NIST), David Ferraiolo (NIST)
As big data, cloud computing, grid computing, and the Internet of Things reshape current data systems and practices, IT experts are keen to harness the power of distributed systems to boost security and prevent fraud. How can these systems’ capabilities be used to improve processing without inflating risk?
As big data, cloud computing, grid computing, and the Internet of Things reshape current data systems and practices, IT experts are keen to harness the power of distributed systems to boost security and prevent fraud. How can these systems’ capabilities be used to improve processing without...
See full abstract
As big data, cloud computing, grid computing, and the Internet of Things reshape current data systems and practices, IT experts are keen to harness the power of distributed systems to boost security and prevent fraud. How can these systems’ capabilities be used to improve processing without inflating risk?
Hide full abstract
Keywords
cybertrust; security; access control; attribute-based access control; ABAC; distributed systems; cybersecurity
Control Families
None selected