Service Level Agreements for Cloud Computing 2011
DOI: 10.1007/978-1-4614-1614-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Model-Driven Framework for Business Continuity Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Recent approaches to BCM has concentrated on adding decision support to the continuity process [12] or automating the generation of a BCP [16]. Winkler and Gilani present in [16]] a model-driven approach to generate a BCP using model-transformation chains to connect data across the different phases in BCM. Their approach is closer to ours in the generation of the plan, but our analysis is enriched by incorporating a wellestablished requirements methodology as it is the case of KAOS [14].…”
Section: Related Workmentioning
confidence: 99%
“…Recent approaches to BCM has concentrated on adding decision support to the continuity process [12] or automating the generation of a BCP [16]. Winkler and Gilani present in [16]] a model-driven approach to generate a BCP using model-transformation chains to connect data across the different phases in BCM. Their approach is closer to ours in the generation of the plan, but our analysis is enriched by incorporating a wellestablished requirements methodology as it is the case of KAOS [14].…”
Section: Related Workmentioning
confidence: 99%
“…[5], [6] (2) A study on methods for collecting business continuity information in order to implement a BCM framework [7] (3) A study on effective measures in business continuity [8] (4) A study on standards for prioritizing risks [9] However, very few detailed studies have examined methods of determining appropriate incident response measures based on risk analysis. [5] In addition, no studies could be identified that examined the different response sequences which could result from initial incidents.…”
Section: Related Workmentioning
confidence: 99%
“…To make this possible, we have the proposal of the work [23], where the treatment of this requirement is accomplished through the use of Model Driver Engineering -MDE, allowing a higher abstraction of the process and also the exchange of these needs, as well as the creation and reuse of new features and functionality. This view is supported by the work [24], which address security as critical aspect in Cloud environments.…”
Section: B Sla For Cloud Computingmentioning
confidence: 99%