메뉴 건너뛰기




Volumn , Issue , 2012, Pages 64-73

Quantitative assessment of Cloud Security Level Agreements: A case study

Author keywords

Cloud security; Security assessment; Security benchmarks; Security level agreements; Security metrics

Indexed keywords

CLOUD SERVICES; INFORMED DECISION; QUANTITATIVE ASSESSMENTS; SECURITY ASSESSMENT; SECURITY ASSURANCE; SECURITY BENCHMARKS; SECURITY LEVEL; SECURITY METRICS; SERVICE LEVEL AGREEMENTS;

EID: 84867660680     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (31)
  • 5
    • 23844470859 scopus 로고    scopus 로고
    • A reference model for security level evaluation: Policy and fuzzy techniques
    • Casola V., et.al. (2005). A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques. Journal of Universal Computer Science, pages 150-174.
    • (2005) Journal of Universal Computer Science , pp. 150-174
    • Casola, V.1
  • 6
    • 84882690392 scopus 로고    scopus 로고
    • A SLA evaluation methodology in service oriented architectures
    • volume 23 of Springer Advances in Information Security
    • Casola V., et.al. (2006). A SLA evaluation methodology in Service Oriented Architectures. In Quality of Protection, volume 23 of Springer Advances in Information Security, pages 119-130.
    • (2006) Quality of Protection , pp. 119-130
    • Casola, V.1
  • 7
    • 38049094526 scopus 로고    scopus 로고
    • Interoperable Grid PKIs among untrusted domains: An architectural proposal
    • volume 4459 of Springer Lecture Notes in Computer Science
    • Casola, V., et.al. (2007). Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal. In Advances in Grid and Pervasive Computing, volume 4459 of Springer Lecture Notes in Computer Science, pages 39-51.
    • (2007) Advances in Grid and Pervasive Computing , pp. 39-51
    • Casola, V.1
  • 9
    • 84867658553 scopus 로고    scopus 로고
    • Online
    • Center for Internet Security (2009). User Guide for CISCAT. Online: http://benchmarks.cisecurity.org/enus/docs/user-guides/CIS-CAT-Users-Guide.pdf.
    • (2009) User Guide for CISCAT
  • 10
    • 84867659939 scopus 로고    scopus 로고
    • Online
    • Cloud Security Alliance (2011a). Security metrics workgroup. Online: http://www.cloudsecurityalliance.org/Research.html.
    • (2011) Security Metrics Workgroup
  • 17
    • 85014616232 scopus 로고    scopus 로고
    • Assessing the security of internet connected critical infrastructures (the CoMiFin project approach)
    • Ghani, H., et.al. (2010). Assessing the Security of Internet Connected Critical Infrastructures (The CoMiFin Project Approach). In Proc. of the Workshop on Security of the Internet of Things.
    • (2010) Proc. of the Workshop on Security of the Internet of Things
    • Ghani, H.1
  • 18
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • Henning, R. (1999). Security service level agreements: quantifiable security for the enterprise? In Proc. of the ACMWorkshop on New security paradigms, pages 54-60.
    • (1999) Proc. of the ACMWorkshop on New Security Paradigms , pp. 54-60
    • Henning, R.1
  • 21
    • 80054076363 scopus 로고    scopus 로고
    • A general method for assessment of security in complex services
    • volume 6994 of Springer Lecture Notes in Computer Science
    • Krautsevich, L., et.al. (2011). A general method for assessment of security in complex services. In Towards a Service-Based Internet, volume 6994 of Springer Lecture Notes in Computer Science, pages 153-164.
    • (2011) Towards A Service-Based Internet , pp. 153-164
    • Krautsevich, L.1
  • 29
    • 77950875313 scopus 로고    scopus 로고
    • Quantified security is a weak hypothesis: A critical survey of results and assumptions
    • Verendel, V. (2009). Quantified security is a weak hypothesis: a critical survey of results and assumptions. In Proc. of the ACM Workshop on new security paradigms, pages 37-50.
    • (2009) Proc. of the ACM Workshop on New Security Paradigms , pp. 37-50
    • Verendel, V.1
  • 30
    • 84867651895 scopus 로고    scopus 로고
    • Online
    • Weisstein, W. (2011a). Frobenius Norm. Online: http://mathworld.wolfram. com/FrobeniusNorm.html.
    • (2011) Frobenius Norm
    • Weisstein, W.1
  • 31
    • 84867658559 scopus 로고    scopus 로고
    • Online
    • Weisstein, W. (2011b). L1-Norm. Online: http://mathworld.wolfram.com/L1- Norm.html.
    • (2011) L1-Norm
    • Weisstein, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.