Management of service level agreements for cloud services in IoT: A systematic mapping study

S Mubeen, SA Asadollah, AV Papadopoulos… - IEEE …, 2017 - ieeexplore.ieee.org
Cloud computing and Internet of Things (IoT) are computing technologies that provide
services to consumers and businesses, allowing organizations to become more agile and …

A systematic literature study on definition and modeling of service-level agreements for cloud services in IoT

S Girs, S Sentilles, SA Asadollah, M Ashjaei… - IEEE …, 2020 - ieeexplore.ieee.org
The cloud computing paradigm provides remote computing resources to the cloud service
consumers and businesses. When combined with Internet of Things (IoT), both technologies …

Collaborative SLA and reputation-based trust management in cloud federations

K Papadakis-Vlachopapadopoulos… - Future Generation …, 2019 - Elsevier
Industry and academia shift from the single cloud provider paradigm to cloud federations
and alternative models, which orchestrate heterogeneous resources, such as Mobile Edge …

Security-by-design in clouds: a security-SLA driven methodology to build secure cloud applications

V Casola, A De Benedictis, M Rak, E Rios - Procedia Computer Science, 2016 - Elsevier
This paper presents a security-by-design methodology for the development of cloud
applications, which relies on Security SLAs as a means to express their security …

Security-by-design in multi-cloud applications: An optimization approach

V Casola, A De Benedictis, M Rak, U Villano - Information Sciences, 2018 - Elsevier
Currently an increasing number of customers require cloud services with guaranteed
security levels. At this aim, the adoption of multi-cloud strategies is spreading in a large …

Switching-time dependent PUF using STT-MRAM

A Kumar, S Sahay, M Suri - … on VLSI Design and 2018 17th …, 2018 - ieeexplore.ieee.org
Physically Unclonable Function (PUF) has become an indispensable on-chip security
primitive for hardware security. Area and power efficient PUFs are required to sustain the …

Security‐aware SaaS placement using swarm intelligence

H Mezni, M Sellami, J Kouki - Journal of Software: Evolution …, 2018 - Wiley Online Library
Cloud computing has emerged as a new powerful service delivery model to cope with
resource challenges and to offer various on‐demand services (eg, software, storage …

Management and enforcement of secured E2E network slices across transport domains

P Alemany, A Molina, C Dangerville, R Asensio… - Optical Fiber …, 2022 - Elsevier
Due to the fact that the current variability of services is brought by the current networks and
the new possibilities that will appear thanks to the near-future networks, Network Slicing has …

Per-service security sla: a new model for security management in clouds

V Casola, A De Benedictis, J Modic… - 2016 IEEE 25th …, 2016 - ieeexplore.ieee.org
In the cloud computing context, Service Level Agreements (SLAs) are contracts between
Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the …

Trust-based scheduling framework for big data processing with MapReduce

TD Dang, D Hoang, DN Nguyen - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Security and privacy have become a great concern in cloud computing platforms in which
users risk the leakage of their private data. The leakage can happen while the data is at rest …