2017 IEEE International Conference on Edge Computing (EDGE) 2017
DOI: 10.1109/ieee.edge.2017.20
|View full text |Cite
|
Sign up to set email alerts
|

Security SLA Based Monitoring in Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…The challenge of including security services in SLAs has been a subject of study before the advent of cloud. With the development of clouds there has been different attempts to include security terms in cloud SLAs [4,5,13,17,20].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The challenge of including security services in SLAs has been a subject of study before the advent of cloud. With the development of clouds there has been different attempts to include security terms in cloud SLAs [4,5,13,17,20].…”
Section: Related Workmentioning
confidence: 99%
“…Kaaniche et al [13] presented security SLA monitoring mechanisms. They extend a language called rSLA and its runtime service, named Sec-rSLA, to support the description of security requirements.…”
Section: Related Workmentioning
confidence: 99%
“…A minority of works addressed transparency, a.k.a. auditing concerns, which have been emphasized by recent regulations and laws [210,211,216,217]. For instance, in [210], Camenisch et al introduce a controlled yet privacy preserving exchange of distributed data scheme, such that each data owner is able to conduct an accurate auditing relying on a public logging system.…”
Section: Privacy-sensitive Auditing Toolsmentioning
confidence: 99%
“…Indeed, very limited works have presented interesting results to achieve a good trade-off. Indeed, recent advances in cryptographic systems have to be applied while considering both efficiency and effectiveness [233,234,235,236,237,217].…”
Section: Privacy-sensitive Data Collection and Inferencementioning
confidence: 99%
“…SLA Monitoring -Service Level Agreements (SLAs) are widely used to describe the agreements between customers and service providers regarding the quality of the provided services [11]. To measure the providers compliance to the SLA, monitoring tools should be setup to collect specific metrics that can quantify the Quality of Service (QoS).…”
Section: Motivating Applications and Requirementsmentioning
confidence: 99%