Management of service level agreements for cloud services in IoT: A systematic mapping study

S Mubeen, SA Asadollah, AV Papadopoulos… - IEEE …, 2017 - ieeexplore.ieee.org
Cloud computing and Internet of Things (IoT) are computing technologies that provide
services to consumers and businesses, allowing organizations to become more agile and …

A coral-reefs and game theory-based approach for optimizing elastic cloud resource allocation

M Ficco, C Esposito, F Palmieri, A Castiglione - Future Generation …, 2018 - Elsevier
Elasticity is a key feature in cloud computing, which distinguishes this paradigm from other
ones, such as cluster and grid computing. On the other hand, dynamic resource reallocation …

Automatically enforcing security slas in the cloud

V Casola, A De Benedictis, M Eraşcu… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Dealing with the provisioning of cloud services granted by Security SLAs is a very
challenging research topic. At the state of the art, the main related issues involve:(i) …

SLA-based secure cloud application development: The SPECS framework

V Casola, A De Benedictis, M Rak… - 2015 17th International …, 2015 - ieeexplore.ieee.org
The perception of lack of control over resources deployed in the cloud may represent one of
the critical factors for an organization to decide to cloudify or not their own services …

Switching-time dependent PUF using STT-MRAM

A Kumar, S Sahay, M Suri - … on VLSI Design and 2018 17th …, 2018 - ieeexplore.ieee.org
Physically Unclonable Function (PUF) has become an indispensable on-chip security
primitive for hardware security. Area and power efficient PUFs are required to sustain the …

SLA-driven monitoring of multi-cloud application components using the MUSA framework

E Rios, W Mallouli, M Rak, V Casola… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
The applications that rely on the combined use of multiple independent clouds pose a
challenge to the control of their security. The difficulty of this task resides on the lack of …

Per-service security sla: a new model for security management in clouds

V Casola, A De Benedictis, J Modic… - 2016 IEEE 25th …, 2016 - ieeexplore.ieee.org
In the cloud computing context, Service Level Agreements (SLAs) are contracts between
Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the …

Cloud SLA negotiation and re‐negotiation: An ontology‐based context‐aware approach

T Labidi, A Mtibaa, W Gaaloul… - … Practice and Experience, 2020 - Wiley Online Library
Summary Service Level Agreement (SLA) has recently garnered increasing attention in
cloud computing due to its capability in the definition and the monitoring of the Quality of …

Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS

A Teshome, L Rilling, C Morin - NOMS 2018-2018 IEEE/IFIP …, 2018 - ieeexplore.ieee.org
In an IaaS cloud the physical infrastructure is controlled by service providers, including its
security monitoring aspect. Clients hosting their information system are incited to trust the …

Trust Management Framework for Handling Security Issues in Multi-cloud Environment

S Prithi, D Sumathi, T Poongodi, P Suresh - Operationalizing Multi-Cloud …, 2022 - Springer
An emerged technology that facilitates for processing and managing data that could be
stored on the servers in the remote location is termed as cloud computing. It also acts as a …