[Retracted] Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions

DK Saini, K Kumar, P Gupta - Security and Communication …, 2022 - Wiley Online Library
Cloud computing is a new model for providing computing services, where computing is
delivered as a service over the Internet. Cloud computing is a very popular choice among …

An empirical study of using planning poker for user story estimation

NC Haugen - AGILE 2006 (AGILE'06), 2006 - ieeexplore.ieee.org
Group estimation of user stories is an important part of extreme programming (XP), used for
both planning releases and iterations. Research has shown that although group estimation …

Security as a service using an SLA-based approach via SPECS

M Rak, N Suri, J Luna, D Petcu… - 2013 IEEE 5th …, 2013 - ieeexplore.ieee.org
The cloud offers attractive options to migrate corporate applications, without any implication
for the corporate security manager to manage or to secure physical resources. While this …

Agent based information security framework for hybrid cloud computing

MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …

Benchmarking cloud security level agreements using quantitative policy trees

J Luna Garcia, R Langenberg, N Suri - … of the 2012 ACM Workshop on …, 2012 - dl.acm.org
While the many economic and technological advantages of Cloud computing are apparent,
the migration of key sector applications onto it has been limited, in part, due to the lack of …

Security standard compliance and continuous verification for Industrial Internet of Things

A Bicaku, M Tauber, J Delsing - International Journal of …, 2020 - journals.sagepub.com
Due to globalization and digitalization of industrial systems, standard compliance is gaining
more attention. In order to stay competitive and remain in business, different sectors within …

AHP-based quantitative approach for assessing and comparing cloud security

A Taha, R Trapero, J Luna… - 2014 IEEE 13th …, 2014 - ieeexplore.ieee.org
While Cloud usage increasingly involves security considerations, there is still a conspicuous
lack of techniques for users to assess/ensure that the security level advertised by the Cloud …

Threat modeling for cloud data center infrastructures

N Alhebaishi, L Wang, S Jajodia, A Singhal - Foundations and Practice of …, 2017 - Springer
Cloud computing has undergone rapid expansion throughout the last decade. Many
companies and organizations have made the transition from traditional data centers to the …

A review of security risk assessment methods in cloud computing

FM Alturkistani, AZ Emam - New Perspectives in Information Systems and …, 2014 - Springer
The Cloud computing is a major technological trend that continues to evolve and flourish. It
has potential benefits in achieving rapid and scalable resource provisioning capabilities as …

Security assurance assessment methodology for hybrid clouds

A Hudic, P Smith, ER Weippl - Computers & Security, 2017 - Elsevier
The emergence of the cloud computing paradigm has altered the delivery models for ICT
services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced …