Management of service level agreements for cloud services in IoT: A systematic mapping study
Cloud computing and Internet of Things (IoT) are computing technologies that provide
services to consumers and businesses, allowing organizations to become more agile and …
services to consumers and businesses, allowing organizations to become more agile and …
A coral-reefs and game theory-based approach for optimizing elastic cloud resource allocation
Elasticity is a key feature in cloud computing, which distinguishes this paradigm from other
ones, such as cluster and grid computing. On the other hand, dynamic resource reallocation …
ones, such as cluster and grid computing. On the other hand, dynamic resource reallocation …
Automatically enforcing security slas in the cloud
Dealing with the provisioning of cloud services granted by Security SLAs is a very
challenging research topic. At the state of the art, the main related issues involve:(i) …
challenging research topic. At the state of the art, the main related issues involve:(i) …
SLA-based secure cloud application development: The SPECS framework
The perception of lack of control over resources deployed in the cloud may represent one of
the critical factors for an organization to decide to cloudify or not their own services …
the critical factors for an organization to decide to cloudify or not their own services …
Switching-time dependent PUF using STT-MRAM
Physically Unclonable Function (PUF) has become an indispensable on-chip security
primitive for hardware security. Area and power efficient PUFs are required to sustain the …
primitive for hardware security. Area and power efficient PUFs are required to sustain the …
SLA-driven monitoring of multi-cloud application components using the MUSA framework
The applications that rely on the combined use of multiple independent clouds pose a
challenge to the control of their security. The difficulty of this task resides on the lack of …
challenge to the control of their security. The difficulty of this task resides on the lack of …
Per-service security sla: a new model for security management in clouds
In the cloud computing context, Service Level Agreements (SLAs) are contracts between
Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the …
Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the …
Cloud SLA negotiation and re‐negotiation: An ontology‐based context‐aware approach
Summary Service Level Agreement (SLA) has recently garnered increasing attention in
cloud computing due to its capability in the definition and the monitoring of the Quality of …
cloud computing due to its capability in the definition and the monitoring of the Quality of …
Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS
A Teshome, L Rilling, C Morin - NOMS 2018-2018 IEEE/IFIP …, 2018 - ieeexplore.ieee.org
In an IaaS cloud the physical infrastructure is controlled by service providers, including its
security monitoring aspect. Clients hosting their information system are incited to trust the …
security monitoring aspect. Clients hosting their information system are incited to trust the …
Trust Management Framework for Handling Security Issues in Multi-cloud Environment
An emerged technology that facilitates for processing and managing data that could be
stored on the servers in the remote location is termed as cloud computing. It also acts as a …
stored on the servers in the remote location is termed as cloud computing. It also acts as a …