2013 IEEE 5th International Conference on Cloud Computing Technology and Science 2013
DOI: 10.1109/cloudcom.2013.133
|View full text |Cite
|
Sign up to set email alerts
|

Access Control and Security Properties Requirements Specification for Clouds' SecLAs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Guesmi and Clemente in [7] described security-related SLAs in relation to problems arise in cloud-based services. The authors noted that external SPs should be able to describe what they can supply regarding security capabilities specified in SLAs according to security requirements, which help the providers to convince the customers regarding their security capabilities.…”
Section: Reflection With Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Guesmi and Clemente in [7] described security-related SLAs in relation to problems arise in cloud-based services. The authors noted that external SPs should be able to describe what they can supply regarding security capabilities specified in SLAs according to security requirements, which help the providers to convince the customers regarding their security capabilities.…”
Section: Reflection With Related Workmentioning
confidence: 99%
“…However, there is an absence of coherent approaches for preserving the confidentiality of sensitive data across GAs when using such SLAs. On top of that, most external SPs place a greater emphasis on the system availability and performance aspects, but overlook security in SLAs [3,4,7]. Also, they do not adequately incorporate security capabilities of the SPs into formulating security-related SLAs.…”
Section: Introductionmentioning
confidence: 99%
“…Of course, the lack of assurance of confidentiality and integrity of handled sensitive government data is a major drawback. For instance, Guesmi and Clemente [9] pointed out that existing cloud SPs do not express service provisions in terms of data protection and data security in their SLAs.…”
Section: Background and Related Workmentioning
confidence: 99%
“…This two security requirements are usually used in some cloud based data sharing scenarios, such as [3][4][5]. While the third one is mainly about the SLA, several research work has considered [6][7][8]. [6] proposes a SLA-driven resource allocation scheme but does not provide cross-layer elasticity management.…”
Section: Introductionmentioning
confidence: 99%
“…Using collaboration in network environment is no longer a conventional abstract conception but truly involved in many cyber areas, while in cloud computing scenery, people like Almorsy proposed the notion of evaluating Cloud SecLAs, by introducing a metric to benchmark the security of a CSP based on categories [8]. Xu etc.…”
Section: Introductionmentioning
confidence: 99%