Quality of Protection
DOI: 10.1007/978-0-387-36584-8_10
|View full text |Cite
|
Sign up to set email alerts
|

A SLA evaluation methodology in Service Oriented Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
3

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(28 citation statements)
references
References 5 publications
0
25
0
3
Order By: Relevance
“…The inputs represent the measurable qualities which are the accuracy, availability, capacity, cost, related time, and scalability. The values of these inputs represent numeric value all the time ≤ 1 [11].One or two hidden layers to test the effect of increasing the hidden layers upon the performance of the architecture. The output layer consists either one neuron if we want to calculate trace of measurable matrix or five neurons represent the outputs (Request, Wait, Change, New Service, and Timer) for measurable part in ANNSLA model.…”
Section: Annsla Matlab Architecturementioning
confidence: 99%
“…The inputs represent the measurable qualities which are the accuracy, availability, capacity, cost, related time, and scalability. The values of these inputs represent numeric value all the time ≤ 1 [11].One or two hidden layers to test the effect of increasing the hidden layers upon the performance of the architecture. The output layer consists either one neuron if we want to calculate trace of measurable matrix or five neurons represent the outputs (Request, Wait, Change, New Service, and Timer) for measurable part in ANNSLA model.…”
Section: Annsla Matlab Architecturementioning
confidence: 99%
“…The result is a collection of security statements (also called "security provisions" as in Figure 1) in the form {security attribute, value} (e.g., {Backup Frequency, Daily} and {Encryption Key Size, 512 bits}), as also proposed in different industrial and academic works [8], [29] and [23]. In order to be manageable, these security provisions must be organized into "categories" derived from a taxonomy e.g., Savola [30] or the Cloud Security Alliance's Cloud 1 http://quant-security.org Controls Matrix [9].…”
Section: Cloud Security Level Agreements (Seclas)mentioning
confidence: 99%
“…The concept of LSL is aligned with the notion of security ranges presented by Irvine and Levin [17] and has been widely used in the past (e.g. in [6], [8], [22] and [24]). …”
Section: Quantitative Aggregation On the Qptmentioning
confidence: 99%
“…Security requirements for web services have been treated by Casola et. al., who proposed a methodology to help evaluate and compare security SLAs (Casola et al, 2006). Frankova and Yautsiukhin have also recognized the need for security in SLAs (Frankova and Yautsiukhin, 2007), however, their approach focuses on the process of selecting the optimal service composition based on a set of predefined requirements rather than detailing what security mechanisms to include.…”
Section: Related Workmentioning
confidence: 99%