Management of service level agreements for cloud services in IoT: A systematic mapping study
Cloud computing and Internet of Things (IoT) are computing technologies that provide
services to consumers and businesses, allowing organizations to become more agile and …
services to consumers and businesses, allowing organizations to become more agile and …
A security monitoring system for internet of things
The wide adoption of the Internet of Things (IoT) paradigm in several application domains
has raised new security issues, which should be carefully taken into account to achieve a …
has raised new security issues, which should be carefully taken into account to achieve a …
Automatically enforcing security slas in the cloud
Dealing with the provisioning of cloud services granted by Security SLAs is a very
challenging research topic. At the state of the art, the main related issues involve:(i) …
challenging research topic. At the state of the art, the main related issues involve:(i) …
Hawk: DevOps-driven transparency and accountability in cloud native systems
E Grünewald, J Kiesel, SR Akbayin… - 2023 IEEE 16th …, 2023 - ieeexplore.ieee.org
Transparency is one of the most important principles of modern privacy regulations, such as
the GDPR or CCPA. To be compliant with such regulatory frameworks, data controllers must …
the GDPR or CCPA. To be compliant with such regulatory frameworks, data controllers must …
Towards automated penetration testing for cloud applications
The development of cloud applications raises several security concerns due to the lack of
control over involved resources. Security testing is fundamental to identify the existing …
control over involved resources. Security testing is fundamental to identify the existing …
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …
Security-by-design in multi-cloud applications: An optimization approach
Currently an increasing number of customers require cloud services with guaranteed
security levels. At this aim, the adoption of multi-cloud strategies is spreading in a large …
security levels. At this aim, the adoption of multi-cloud strategies is spreading in a large …
A methodology for automated penetration testing of cloud applications
Security assessment is a very time-and money-consuming activity. It needs specialised
security skills and, furthermore, it is not fully integrated into the software development life …
security skills and, furthermore, it is not fully integrated into the software development life …
[PDF][PDF] Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …
A framework for security transparency in cloud computing
Individuals and corporate users are persistently considering cloud adoption due to its
significant benefits compared to traditional computing environments. The data and …
significant benefits compared to traditional computing environments. The data and …