Towards quantification and evaluation of security of Cloud Service Providers

T Halabi, M Bellaiche - Journal of Information Security and Applications, 2017 - Elsevier
Security is still the main obstacle preventing companies and businesses which deal with
private information and confidential data from migrating towards the Cloud. Cloud Service …

[HTML][HTML] A risk assessment model for selecting cloud service providers

E Cayirci, A Garaga, A Santana de Oliveira… - Journal of Cloud …, 2016 - Springer
Abstract The Cloud Adoption Risk Assessment Model is designed to help cloud customers in
assessing the risks that they face by selecting a specific cloud service provider. It evaluates …

Quantitative reasoning about cloud security using service level agreements

J Luna, A Taha, R Trapero… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
While the economic and technological advantages of cloud computing are apparent, its
overall uptake has been limited, in part, due to the lack of security assurance and …

A cloud trust evaluation system using hierarchical fuzzy inference system for service selection

C Qu, R Buyya - 2014 IEEE 28th International Conference on …, 2014 - ieeexplore.ieee.org
Cloud computing is an utility computing paradigm that allows users to flexibly acquire
virtualized computing resources in a pay-as-you-go model. To realize the benefits of using …

Security as a service using an SLA-based approach via SPECS

M Rak, N Suri, J Luna, D Petcu… - 2013 IEEE 5th …, 2013 - ieeexplore.ieee.org
The cloud offers attractive options to migrate corporate applications, without any implication
for the corporate security manager to manage or to secure physical resources. While this …

Leveraging the potential of cloud security service-level agreements through standards

J Luna, N Suri, M Iorga, A Karmel - IEEE Cloud Computing, 2015 - ieeexplore.ieee.org
Despite the undisputed advantages of cloud computing, customers-in particular, small and
medium enterprises (SMEs)-still need meaningful understanding of the security and risk …

AHP-based quantitative approach for assessing and comparing cloud security

A Taha, R Trapero, J Luna… - 2014 IEEE 13th …, 2014 - ieeexplore.ieee.org
While Cloud usage increasingly involves security considerations, there is still a conspicuous
lack of techniques for users to assess/ensure that the security level advertised by the Cloud …

Development of methods for identifying an appropriate benchmarking peer to establish information security policy

M Kang, A Hovav, ET Lee, S Um, H Kim - Expert Systems with Applications, 2022 - Elsevier
Benchmarking methodology provides organizations with appropriate information security
policy. However, selecting an appropriate organization as a benchmarking peer can be a …

[图书][B] The cloud security ecosystem: technical, legal, business and management issues

R Choo, R Ko - 2015 - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …

Novel efficient techniques for real-time cloud security assessment

J Modic, R Trapero, A Taha, J Luna, M Stopar… - Computers & Security, 2016 - Elsevier
Cloud computing offers multiple benefits to users by offloading them of the tasks of setting up
complex infrastructure and costly services. However, these benefits come with a price …