2017
DOI: 10.1109/tsc.2016.2540630
|View full text |Cite
|
Sign up to set email alerts
|

Automatically Enforcing Security SLAs in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…• resilience to attacks and failures, by introducing redundancy and diversity techniques, and • protection from unauthorized and potentially dangerous accesses, by integrating proper intrusion detection tools. We extended its formulation from [5] by including hardware requirements for its components and by formulating the mapping task (assignment of components to VMs) as a constrained optimization problem aiming to minimize the overall cost.…”
Section: Motivating Case Studiesmentioning
confidence: 99%
“…• resilience to attacks and failures, by introducing redundancy and diversity techniques, and • protection from unauthorized and potentially dangerous accesses, by integrating proper intrusion detection tools. We extended its formulation from [5] by including hardware requirements for its components and by formulating the mapping task (assignment of components to VMs) as a constrained optimization problem aiming to minimize the overall cost.…”
Section: Motivating Case Studiesmentioning
confidence: 99%
“…In the context of the SPECS project, authors in Casola et al have extended WS‐Agreement to propose a model of Security SLA, allowing for the representation of security‐related concepts in a machine‐readable format. The Security SLA model includes 2 parts.…”
Section: Security Issues In Saas Managementmentioning
confidence: 99%
“…Thus, Halkidis et al [69] have presented security enforcement at the design phase to prevent the systems from known categorised attacks that may generate the security faults. Casola et al [121] have presented a security SLA model by security SLA lifecycle management with a framework.…”
Section: Security and Privacymentioning
confidence: 99%