2015
DOI: 10.1109/mcc.2015.52
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(26 citation statements)
references
References 3 publications
0
24
0
2
Order By: Relevance
“…Lindner et al [35] believe the application of the supply chain concept to cloud computing to be innovative and suggest the possibility of a new research field. According to Jenks [36], there is a gap between the 'what' and 'how' processes of managing cloud supply chain cybersecurity risks, and seeing that only a few recommendations have been made to bridge this gap, it remains an open research problem [37,38].…”
Section: Cloud Supply Chain Risksmentioning
confidence: 99%
“…Lindner et al [35] believe the application of the supply chain concept to cloud computing to be innovative and suggest the possibility of a new research field. According to Jenks [36], there is a gap between the 'what' and 'how' processes of managing cloud supply chain cybersecurity risks, and seeing that only a few recommendations have been made to bridge this gap, it remains an open research problem [37,38].…”
Section: Cloud Supply Chain Risksmentioning
confidence: 99%
“…In order to apply the proposed approach in the cloud environment and for specific services, instead that respect to the overall CSPs infrastructure, recently such controls are embedded into Security SLA in order to grant the level of security offered by each service ( (Casola, 2015b), (Luna et al, 2015)). …”
Section: Selection Of Controlsmentioning
confidence: 99%
“…In multicloud systems, the CSP's ability to secure customer data and assure customers of the compliance of other suppliers involved in the provision of the service becomes more complicated due to the many moving parts. The further away the CSP is from the cloud customer, the coarser the customer's view of the CSP's security policies and processes [4]. As the growth of cloud computing and adoption continue to increase, the move to the cloud will gradually change from being a tactical means for cost reduction, into a strategic tool for business transformation.…”
Section: Introductionmentioning
confidence: 99%