The document discusses a survey on context security policies in cloud computing, addressing various security challenges such as data leakage, loss, and account hijacking. It explores policy modeling techniques, comparing traditional access control models with context-aware approaches, and highlights the limitations of existing models. Future work aims to develop and validate context and policy models for improved security in cloud applications.
Related topics: