Towards quantification and evaluation of security of Cloud Service Providers
T Halabi, M Bellaiche - Journal of Information Security and Applications, 2017 - Elsevier
Security is still the main obstacle preventing companies and businesses which deal with
private information and confidential data from migrating towards the Cloud. Cloud Service …
private information and confidential data from migrating towards the Cloud. Cloud Service …
[HTML][HTML] A risk assessment model for selecting cloud service providers
E Cayirci, A Garaga, A Santana de Oliveira… - Journal of Cloud …, 2016 - Springer
Abstract The Cloud Adoption Risk Assessment Model is designed to help cloud customers in
assessing the risks that they face by selecting a specific cloud service provider. It evaluates …
assessing the risks that they face by selecting a specific cloud service provider. It evaluates …
Quantitative reasoning about cloud security using service level agreements
While the economic and technological advantages of cloud computing are apparent, its
overall uptake has been limited, in part, due to the lack of security assurance and …
overall uptake has been limited, in part, due to the lack of security assurance and …
A cloud trust evaluation system using hierarchical fuzzy inference system for service selection
C Qu, R Buyya - 2014 IEEE 28th International Conference on …, 2014 - ieeexplore.ieee.org
Cloud computing is an utility computing paradigm that allows users to flexibly acquire
virtualized computing resources in a pay-as-you-go model. To realize the benefits of using …
virtualized computing resources in a pay-as-you-go model. To realize the benefits of using …
Security as a service using an SLA-based approach via SPECS
The cloud offers attractive options to migrate corporate applications, without any implication
for the corporate security manager to manage or to secure physical resources. While this …
for the corporate security manager to manage or to secure physical resources. While this …
Leveraging the potential of cloud security service-level agreements through standards
Despite the undisputed advantages of cloud computing, customers-in particular, small and
medium enterprises (SMEs)-still need meaningful understanding of the security and risk …
medium enterprises (SMEs)-still need meaningful understanding of the security and risk …
AHP-based quantitative approach for assessing and comparing cloud security
While Cloud usage increasingly involves security considerations, there is still a conspicuous
lack of techniques for users to assess/ensure that the security level advertised by the Cloud …
lack of techniques for users to assess/ensure that the security level advertised by the Cloud …
Development of methods for identifying an appropriate benchmarking peer to establish information security policy
Benchmarking methodology provides organizations with appropriate information security
policy. However, selecting an appropriate organization as a benchmarking peer can be a …
policy. However, selecting an appropriate organization as a benchmarking peer can be a …
[图书][B] The cloud security ecosystem: technical, legal, business and management issues
R Choo, R Ko - 2015 - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …
Ecosystem comprehensively discusses a range of cloud security topics from multi …
Novel efficient techniques for real-time cloud security assessment
Cloud computing offers multiple benefits to users by offloading them of the tasks of setting up
complex infrastructure and costly services. However, these benefits come with a price …
complex infrastructure and costly services. However, these benefits come with a price …