Management of service level agreements for cloud services in IoT: A systematic mapping study
Cloud computing and Internet of Things (IoT) are computing technologies that provide
services to consumers and businesses, allowing organizations to become more agile and …
services to consumers and businesses, allowing organizations to become more agile and …
A systematic literature study on definition and modeling of service-level agreements for cloud services in IoT
The cloud computing paradigm provides remote computing resources to the cloud service
consumers and businesses. When combined with Internet of Things (IoT), both technologies …
consumers and businesses. When combined with Internet of Things (IoT), both technologies …
Collaborative SLA and reputation-based trust management in cloud federations
K Papadakis-Vlachopapadopoulos… - Future Generation …, 2019 - Elsevier
Industry and academia shift from the single cloud provider paradigm to cloud federations
and alternative models, which orchestrate heterogeneous resources, such as Mobile Edge …
and alternative models, which orchestrate heterogeneous resources, such as Mobile Edge …
Security-by-design in clouds: a security-SLA driven methodology to build secure cloud applications
This paper presents a security-by-design methodology for the development of cloud
applications, which relies on Security SLAs as a means to express their security …
applications, which relies on Security SLAs as a means to express their security …
Security-by-design in multi-cloud applications: An optimization approach
Currently an increasing number of customers require cloud services with guaranteed
security levels. At this aim, the adoption of multi-cloud strategies is spreading in a large …
security levels. At this aim, the adoption of multi-cloud strategies is spreading in a large …
Switching-time dependent PUF using STT-MRAM
Physically Unclonable Function (PUF) has become an indispensable on-chip security
primitive for hardware security. Area and power efficient PUFs are required to sustain the …
primitive for hardware security. Area and power efficient PUFs are required to sustain the …
Security‐aware SaaS placement using swarm intelligence
Cloud computing has emerged as a new powerful service delivery model to cope with
resource challenges and to offer various on‐demand services (eg, software, storage …
resource challenges and to offer various on‐demand services (eg, software, storage …
Management and enforcement of secured E2E network slices across transport domains
Due to the fact that the current variability of services is brought by the current networks and
the new possibilities that will appear thanks to the near-future networks, Network Slicing has …
the new possibilities that will appear thanks to the near-future networks, Network Slicing has …
Per-service security sla: a new model for security management in clouds
In the cloud computing context, Service Level Agreements (SLAs) are contracts between
Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the …
Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the …
Trust-based scheduling framework for big data processing with MapReduce
Security and privacy have become a great concern in cloud computing platforms in which
users risk the leakage of their private data. The leakage can happen while the data is at rest …
users risk the leakage of their private data. The leakage can happen while the data is at rest …