[Retracted] Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions
DK Saini, K Kumar, P Gupta - Security and Communication …, 2022 - Wiley Online Library
Cloud computing is a new model for providing computing services, where computing is
delivered as a service over the Internet. Cloud computing is a very popular choice among …
delivered as a service over the Internet. Cloud computing is a very popular choice among …
An empirical study of using planning poker for user story estimation
NC Haugen - AGILE 2006 (AGILE'06), 2006 - ieeexplore.ieee.org
Group estimation of user stories is an important part of extreme programming (XP), used for
both planning releases and iterations. Research has shown that although group estimation …
both planning releases and iterations. Research has shown that although group estimation …
Security as a service using an SLA-based approach via SPECS
The cloud offers attractive options to migrate corporate applications, without any implication
for the corporate security manager to manage or to secure physical resources. While this …
for the corporate security manager to manage or to secure physical resources. While this …
Agent based information security framework for hybrid cloud computing
MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …
to an unusual event, and the associated consequences for cloud organization. Information …
Benchmarking cloud security level agreements using quantitative policy trees
J Luna Garcia, R Langenberg, N Suri - … of the 2012 ACM Workshop on …, 2012 - dl.acm.org
While the many economic and technological advantages of Cloud computing are apparent,
the migration of key sector applications onto it has been limited, in part, due to the lack of …
the migration of key sector applications onto it has been limited, in part, due to the lack of …
Security standard compliance and continuous verification for Industrial Internet of Things
Due to globalization and digitalization of industrial systems, standard compliance is gaining
more attention. In order to stay competitive and remain in business, different sectors within …
more attention. In order to stay competitive and remain in business, different sectors within …
AHP-based quantitative approach for assessing and comparing cloud security
While Cloud usage increasingly involves security considerations, there is still a conspicuous
lack of techniques for users to assess/ensure that the security level advertised by the Cloud …
lack of techniques for users to assess/ensure that the security level advertised by the Cloud …
Threat modeling for cloud data center infrastructures
Cloud computing has undergone rapid expansion throughout the last decade. Many
companies and organizations have made the transition from traditional data centers to the …
companies and organizations have made the transition from traditional data centers to the …
A review of security risk assessment methods in cloud computing
FM Alturkistani, AZ Emam - New Perspectives in Information Systems and …, 2014 - Springer
The Cloud computing is a major technological trend that continues to evolve and flourish. It
has potential benefits in achieving rapid and scalable resource provisioning capabilities as …
has potential benefits in achieving rapid and scalable resource provisioning capabilities as …
Security assurance assessment methodology for hybrid clouds
The emergence of the cloud computing paradigm has altered the delivery models for ICT
services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced …
services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced …