TY - GEN
T1 - Overlay architectures enabling cloud computing for multi-level security environments
AU - Lamb, Christopher C.
AU - Heileman, Gregory L.
PY - 2012
Y1 - 2012
N2 - Herein, we consider how overlay architectures can be deployed in order to support usage management in cloud computing. We contrast filter-centric perimeter and policy-centric overlay approaches toward usage management of sensitive content from the perspective of cross-domain solutions and then demonstrate a path from current systems to distributed policy-centric overlay methods. We first cover the need for overlay networks supporting usage management by highlighting the pending migration to utility computing models and the current shortcomings of those kinds of systems from a variety of perspectives. We also briefly cover the state of usage management within these kinds of systems, also examining the known state of the art in proposed cross domain solutions. We then compare and contrast the advantages of policy-based overlay systems to solving usage management issues over sensitive materials within multi-level security environments. We then demonstrate a migration path from current to future solutions. We close with our current and future directions of research.
AB - Herein, we consider how overlay architectures can be deployed in order to support usage management in cloud computing. We contrast filter-centric perimeter and policy-centric overlay approaches toward usage management of sensitive content from the perspective of cross-domain solutions and then demonstrate a path from current systems to distributed policy-centric overlay methods. We first cover the need for overlay networks supporting usage management by highlighting the pending migration to utility computing models and the current shortcomings of those kinds of systems from a variety of perspectives. We also briefly cover the state of usage management within these kinds of systems, also examining the known state of the art in proposed cross domain solutions. We then compare and contrast the advantages of policy-based overlay systems to solving usage management issues over sensitive materials within multi-level security environments. We then demonstrate a migration path from current to future solutions. We close with our current and future directions of research.
KW - cross domain solutions
KW - overlay networks
KW - usage management
UR - http://www.scopus.com/inward/record.url?scp=84867270186&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867270186&partnerID=8YFLogxK
U2 - 10.1109/SERVICES.2012.20
DO - 10.1109/SERVICES.2012.20
M3 - Conference contribution
AN - SCOPUS:84867270186
SN - 9780769547565
T3 - Proceedings - 2012 IEEE 8th World Congress on Services, SERVICES 2012
SP - 116
EP - 124
BT - Proceedings - 2012 IEEE 8th World Congress on Services, SERVICES 2012
T2 - 2012 IEEE 8th World Congress on Services, SERVICES 2012
Y2 - 24 June 2012 through 29 June 2012
ER -