Management of service level agreements for cloud services in IoT: A systematic mapping study

S Mubeen, SA Asadollah, AV Papadopoulos… - IEEE …, 2017 - ieeexplore.ieee.org
Cloud computing and Internet of Things (IoT) are computing technologies that provide
services to consumers and businesses, allowing organizations to become more agile and …

A security monitoring system for internet of things

V Casola, A De Benedictis, A Riccio, D Rivera… - Internet of Things, 2019 - Elsevier
The wide adoption of the Internet of Things (IoT) paradigm in several application domains
has raised new security issues, which should be carefully taken into account to achieve a …

Automatically enforcing security slas in the cloud

V Casola, A De Benedictis, M Eraşcu… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Dealing with the provisioning of cloud services granted by Security SLAs is a very
challenging research topic. At the state of the art, the main related issues involve:(i) …

Hawk: DevOps-driven transparency and accountability in cloud native systems

E Grünewald, J Kiesel, SR Akbayin… - 2023 IEEE 16th …, 2023 - ieeexplore.ieee.org
Transparency is one of the most important principles of modern privacy regulations, such as
the GDPR or CCPA. To be compliant with such regulatory frameworks, data controllers must …

Towards automated penetration testing for cloud applications

V Casola, A De Benedictis, M Rak… - 2018 IEEE 27th …, 2018 - ieeexplore.ieee.org
The development of cloud applications raises several security concerns due to the lack of
control over involved resources. Security testing is fundamental to identify the existing …

Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities

AM Dissanayaka, S Mengel, L Gittner, H Khan - Cluster Computing, 2020 - Springer
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …

Security-by-design in multi-cloud applications: An optimization approach

V Casola, A De Benedictis, M Rak, U Villano - Information Sciences, 2018 - Elsevier
Currently an increasing number of customers require cloud services with guaranteed
security levels. At this aim, the adoption of multi-cloud strategies is spreading in a large …

A methodology for automated penetration testing of cloud applications

V Casola, AD Benedictis, M Rak… - International Journal of …, 2020 - inderscienceonline.com
Security assessment is a very time-and money-consuming activity. It needs specialised
security skills and, furthermore, it is not fully integrated into the software development life …

[PDF][PDF] Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs

AM Dissanayaka, S Mengel, L Gittner… - … Conference of the …, 2018 - researchgate.net
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …

A framework for security transparency in cloud computing

UM Ismail, S Islam, M Ouedraogo, E Weippl - Future Internet, 2016 - mdpi.com
Individuals and corporate users are persistently considering cloud adoption due to its
significant benefits compared to traditional computing environments. The data and …