2015
DOI: 10.1007/978-3-319-27243-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy Cloud Certification: A Model-Based Approach

Abstract: Cloud computing is introducing an architectural paradigm shift that involves a large part of the IT industry. The flexibility in allocating and releasing resources at runtime creates new business opportunities for service providers and their customers. However, despite its advantages, cloud computing is still not showing its full potential. Lack of mechanisms to formally assess the behavior of the cloud and its services/processes, in fact, negatively affects the trust relation between providers and potential c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…To ll in this gap, we extend our model-based certication process in Anisetti et al (2014aAnisetti et al ( , 2015 with a methodology for the verication of the correctness of the system model. We assume the system model to be either manually gener-ated by the system provider with the help of the accredited lab or automatically generated according to existing solutions (e.g., Anisetti et al (2014b); Merten et al (2012); Ernst et al (1999)). Our certication process implements the pre-deployment and production evaluation steps, and extends the system model adding time, probability, conguration constraints, and attack paths tested on the ToC.…”
Section: Trustworthy Certication Processmentioning
confidence: 99%
See 2 more Smart Citations
“…To ll in this gap, we extend our model-based certication process in Anisetti et al (2014aAnisetti et al ( , 2015 with a methodology for the verication of the correctness of the system model. We assume the system model to be either manually gener-ated by the system provider with the help of the accredited lab or automatically generated according to existing solutions (e.g., Anisetti et al (2014b); Merten et al (2012); Ernst et al (1999)). Our certication process implements the pre-deployment and production evaluation steps, and extends the system model adding time, probability, conguration constraints, and attack paths tested on the ToC.…”
Section: Trustworthy Certication Processmentioning
confidence: 99%
“…More recently, the works in Anisetti et al (2014aAnisetti et al ( , 2015Anisetti et al ( , 2014b; Ardagna et al (2016) have provided the basic building blocks for the denition of a certication process addressing cloud peculiarities. In this paper, we consider advanced aspects aimed to guarantee the trustworthiness of the certication process in a dynamic cloud, including constraints on time relations between dierent states of the model, transition probabilities, and congurations, and attack paths for certicate validity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A failure returned by the verification process is triggered by i) an inconsistency between the certification model and the execution traces, or ii) a violation of configuration constraints. Scenario i) requires a system adaptation and has been already tackled in our previous work in [13]. Scenario ii) is the target of the adaptation approach in this paper.…”
Section: Definition 1 (Certification Model)mentioning
confidence: 99%