2012
DOI: 10.1016/j.cose.2012.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Applying security policies and service level agreement to IaaS service model to enhance security and transition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
25
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(26 citation statements)
references
References 25 publications
1
25
0
Order By: Relevance
“…In practice, the services offered by clouds can be grouped into three main categories (Zhang et al, 2010;Lian et al, 2014;Walz & Grier, 2010;Karadsheh, 2012): Infrastructure as a service (IaaS) allows cloud clients to create various configurations of computer systems from servers to complete clusters and also to host their own services and even complete software systems without having to worry about hardware costs (Goscinski & Brock, 2010). Platform as a service (PaaS) provides developers with a platform including systems and environments comprising all life cycle of developing, testing, deploying and hosting of web applications (Rimal et al, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…In practice, the services offered by clouds can be grouped into three main categories (Zhang et al, 2010;Lian et al, 2014;Walz & Grier, 2010;Karadsheh, 2012): Infrastructure as a service (IaaS) allows cloud clients to create various configurations of computer systems from servers to complete clusters and also to host their own services and even complete software systems without having to worry about hardware costs (Goscinski & Brock, 2010). Platform as a service (PaaS) provides developers with a platform including systems and environments comprising all life cycle of developing, testing, deploying and hosting of web applications (Rimal et al, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…It is the evolution of application service provider (ASP), an existing application service providing form [32][33][34]. Figure 3 shows Microsoft's cloud computing services.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, there is no specific security role inside FDD [66][67][68]. Of course there are many security methods that been applied in the real world [69][70][71][72][73][74][75][76][77][78][79][80], especially in Malaysia [80] and India [81].There is also discussion and much awareness among IT organizations regarding software security practices [82] and the human factors that could attribute to software security [83].However, there is no specific research regarding the integration of security and FDD.…”
Section: Q3: How Is the Integration Between Security And Fddmentioning
confidence: 99%