2016
DOI: 10.3390/fi8020013
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Security in Cloud Ecosystems

Abstract: Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been developed to coexist and evolve together. The stakeholders of such a system need a variety of models to give them a perspective of the possibilities of the system, to evaluate specific quality attributes, and to extend th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 32 publications
0
12
0
Order By: Relevance
“…Dsouza et al proposed a policy‐driven security management approach for fog resources including policy analysis and its integration with the fog paradigm. However, the approach fails to consider rights inheritance or propagation of rights in the ecosystem . Stojmenovic and Wen presented a survey of fog applications and the associated security challenges.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Dsouza et al proposed a policy‐driven security management approach for fog resources including policy analysis and its integration with the fog paradigm. However, the approach fails to consider rights inheritance or propagation of rights in the ecosystem . Stojmenovic and Wen presented a survey of fog applications and the associated security challenges.…”
Section: Related Workmentioning
confidence: 99%
“…However, the approach fails to consider rights inheritance or propagation of rights in the ecosystem. 47,48 Stojmenovic and Wen 48 presented a survey of fog applications and the associated security challenges. In particular, the authors analyzed man-in-the-middle attacks in the context of fog computing, where fog devices can be compromised or replaced by fake ones.…”
Section: Scada-based Solutionsmentioning
confidence: 99%
“…Security and privacy can also be evaluated using the architectural models that are represented in the form of pattern diagrams including software patterns (Fernandez et al, 2015;Fernandez et al, 2016). Pattern models are especially useful for handling the security of complex systems like SECOs.…”
Section: Rq2: How Are Non-functional Requirements Considered In the Cmentioning
confidence: 99%
“…Basically, "a pattern is a solution to a recurring problem in a specific context" [13]. Patterns are used in the following domains: software requirements (e.g., [14]), software design (e.g., [15,16]), information security engineering (e.g., [17,18]), requirements engineering (e.g., [19][20][21]), test patterns (e.g., [22]), context analysis (e.g., [23]) and more.…”
Section: Pattern-based Context Analysismentioning
confidence: 99%
“…Fernandez et al [13] provided a unified way of representing all the components of a cloud ecosystem as well as security aspects. Our pattern supports the specification of the indirect and direct environments of a cloud system as well as its stakeholders in addition to the cloud system itself.…”
Section: Related Workmentioning
confidence: 99%