Cloud computing

A Sunyaev, A Sunyaev - … computing: Principles of distributed systems and …, 2020 - Springer
Cloud computing is an evolution of information technology and a dominant business model
for delivering IT resources. With cloud computing, individuals and organizations can gain on …

Trust is good, control is better: Creating secure clouds by continuous auditing

S Lins, S Schneider, A Sunyaev - IEEE Transactions on Cloud …, 2016 - ieeexplore.ieee.org
Cloud service certifications (CSC) attempt to assure a high level of security and compliance.
However, considering that cloud services are part of an ever-changing environment, multi …

Designing monitoring systems for continuous certification of cloud services: Deriving meta-requirements and design guidelines

S Lins, S Schneider, J Szefer, S Ibraheem… - Communications of the …, 2019 - aisel.aisnet.org
Continuous service certification (CSC) involves the consistently gathering and assessing
certification-relevant information about cloud service operations to validate whether they …

[图书][B] Cloud as a service: Understanding the service innovation ecosystem

E Castro-Leon, R Harmon - 2016 - books.google.com
See how the principles of Service Science govern the dynamics driving the adoption of
cloud computing in the industry. Cloud as Service shows you how the evolution of enterprise …

Towards continuous security certification of software-as-a-service applications using web application testing techniques

P Stephanow, K Khajehmoogahi - 2017 IEEE 31st International …, 2017 - ieeexplore.ieee.org
Continuous security certification of software-asa-service (SaaS) aims at continuously, ie
repeatedly and automatically validating whether a SaaS application adheres to a set of …

Third-party auditing for cloud service providers in multicloud environment

T Indhumathil, N Aarthy, VD Devi… - 2017 Third …, 2017 - ieeexplore.ieee.org
Cloud Computing provides organizations enabling ubiquitous, on-demand access to a
shared pool of configurable computing with limited management effort. However …

Cloud Computing.: Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor Innentäter-Angriffen de lege lata und de lege ferenda.

D Müller - 2020 - torrossa.com
Cloud Computing. Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor
Innentäter-Angriffen de lege lata und de Page 1 Internetrecht und Digitale Gesellschaft Band 22 …

[PDF][PDF] A Transparent Certification Scheme Based on Blockchain for Service-Based Systems

N Bena, M Pedrinazzi, M Anisetti… - … Conference on Web …, 2024 - perso.liris.cnrs.fr
Modern service-based systems are characterized by applications composed of
heterogeneous services provided by multiple, untrusted providers, and deployed along the …

Continuous test-based certification of cloud services

P Stephanow-Gierach - 2018 - mediatum.ub.tum.de
This thesis introduces a framework to design and represent minimally invasive tests to
support continuous certification of cloud services. Five example scenarios are presented to …

Human and Organizational Threat Profiling Using Machine Learning

P Kumara, KGS Dananjaya… - … on Advancements in …, 2021 - ieeexplore.ieee.org
The usage of online social networking sites is increasing rapidly. But the downside is that
the growth of various kinds of ongoing social media threats such as fake profiles …