WiP: A novel blockchain-based trust model for cloud identity management
Secure and reliable management of identities has become one of the greatest challenges
facing cloud computing today, mainly due to the huge number of new cloud-based …
facing cloud computing today, mainly due to the huge number of new cloud-based …
A semi-automatic and trustworthy scheme for continuous cloud service certification
Traditional assurance solutions for software-based systems rely on static verification
techniques and assume continuous availability of trusted third parties. With the advent of …
techniques and assume continuous availability of trusted third parties. With the advent of …
Multi-dimensional certification of modern distributed systems
The cloud computing has deeply changed how distributed systems are engineered, leading
to the proliferation of ever-evolving and complex environments, where legacy systems …
to the proliferation of ever-evolving and complex environments, where legacy systems …
Designing monitoring systems for continuous certification of cloud services: Deriving meta-requirements and design guidelines
Continuous service certification (CSC) involves the consistently gathering and assessing
certification-relevant information about cloud service operations to validate whether they …
certification-relevant information about cloud service operations to validate whether they …
Big Data Assurance: An Approach Based on Service-Level Agreements
Big data management is a key enabling factor for enterprises that want to compete in the
global market. Data coming from enterprise production processes, if properly analyzed, can …
global market. Data coming from enterprise production processes, if properly analyzed, can …
Test-based security certification of composite services
The diffusion of service-based and cloud-based systems has created a scenario where
software is often made available as services, offered as commodities over corporate …
software is often made available as services, offered as commodities over corporate …
A security certification scheme for information-centric networks
Information-Centric Networking is an emerging alternative to host-centric networking
designed for large-scale content distribution and stricter privacy requirements. Recent …
designed for large-scale content distribution and stricter privacy requirements. Recent …
Towards continuous security certification of software-as-a-service applications using web application testing techniques
P Stephanow, K Khajehmoogahi - 2017 IEEE 31st International …, 2017 - ieeexplore.ieee.org
Continuous security certification of software-asa-service (SaaS) aims at continuously, ie
repeatedly and automatically validating whether a SaaS application adheres to a set of …
repeatedly and automatically validating whether a SaaS application adheres to a set of …
Non-Functional Certification of Modern Distributed Systems: A Research Manifesto
CA Ardagna, N Bena - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
The huge progress of ICT is radically changing distributed systems at their roots, modifying
their operation and engineering practices and introducing new non-functional (eg, security …
their operation and engineering practices and introducing new non-functional (eg, security …
Evaluating the performance of continuous test-based cloud service certification
P Stephanow, C Banse - … on Cluster, Cloud and Grid Computing …, 2017 - ieeexplore.ieee.org
Continuous test-based cloud certification uses tests to automatically and repeatedly
evaluate whether a cloud service satisfies customer requirements over time. However …
evaluate whether a cloud service satisfies customer requirements over time. However …