[HTML][HTML] Understanding the challenges and novel architectural models of multi-cloud native applications–a systematic literature review

J Alonso, L Orue-Echevarria, V Casola, AI Torre… - Journal of Cloud …, 2023 - Springer
Abstract The evolution of Cloud Computing into a service utility, along with the pervasive
adoption of the IoT paradigm, has promoted a significant growth in the need of …

Security by design for big data frameworks over cloud computing

FM Awaysheh, MN Aladwan, M Alazab… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …

A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach

V Casola, A De Benedictis, M Rak, U Villano - Journal of Systems and …, 2020 - Elsevier
Recent software development methodologies, as DevOps or Agile, are very popular and
widely used, especially for the development of cloud services and applications. They …

Toward the automation of threat modeling and risk assessment in IoT systems

V Casola, A De Benedictis, M Rak, U Villano - Internet of Things, 2019 - Elsevier
Abstract The Internet of Things (IoT) has recently become one of the most relevant emerging
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …

[HTML][HTML] Vulnerability to cyberattacks and sociotechnical solutions for health care systems: systematic review

P Ewoh, T Vartiainen - Journal of medical internet research, 2024 - jmir.org
Background Health care organizations worldwide are faced with an increasing number of
cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant …

Cloud computing: developing contemporary computer science curriculum for a cloud-first future

D Foster, L White, J Adams, DC Erdil… - … Companion of the 23rd …, 2018 - dl.acm.org
Cloud Computing adoption has seen significant growth over the last five years. It offers a
diverse range of scalable and redundant service deployment models, including …

Security-aware deployment optimization of cloud–edge systems in industrial iot

V Casola, A De Benedictis, S Di Martino… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Cloud computing, edge computing, and the Internet of Things are significantly changing from
the original architectural models with pure provisioning of virtual resources (and services) to …

Lightweight cloud application sandboxing

M Abbadini, M Beretta, D Facchinetti… - … on Cloud Computing …, 2023 - ieeexplore.ieee.org
Modern cloud applications can quickly grow to an elaborate and intricate tangle of services.
In this scenario, paying attention to security aspects is important to mitigate the impact of …

Systemic risk and vulnerability analysis of multi-cloud environments

M Reece, TE Lander Jr, M Stoffolano… - arXiv preprint arXiv …, 2023 - arxiv.org
With the increasing use of multi-cloud environments, security professionals face challenges
in configuration, management, and integration due to uneven security capabilities and …

Scalable optimal deployment in the cloud of component-based applications using optimization modulo theory, mathematical programming and symmetry breaking

M Eraşcu, F Micota, D Zaharie - Journal of Logical and Algebraic Methods …, 2021 - Elsevier
Automated deployment of component-based applications in the Cloud consists in the
allocation of virtual machines (VMs) offers from various Cloud Providers such that the …