메뉴 건너뛰기




Volumn , Issue , 2012, Pages 730-735

Risk propagation of security SLAs in the cloud

Author keywords

algorithms; audit; certification; cloud computing; matchmaking; quality of security service; risk; security; service level agreement; web services

Indexed keywords

AUDIT; CERTIFICATION; MATCHMAKING; QUALITY OF SECURITY SERVICES; SECURITY; SERVICE LEVEL AGREEMENTS;

EID: 84875681664     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOMW.2012.6477665     Document Type: Conference Paper
Times cited : (11)

References (21)
  • 3
    • 84867244563 scopus 로고    scopus 로고
    • SecAgreement: Advancing security risk calculations in cloud services
    • M. Hale, and R. Gamble, "SecAgreement: Advancing Security Risk Calculations in Cloud Services," 8th IEEE World Congress on Services, 2012.
    • (2012) 8th IEEE World Congress on Services
    • Hale, M.1    Gamble, R.2
  • 5
    • 79955688700 scopus 로고    scopus 로고
    • Service level agreement in cloud computing
    • Pankesh Patel, Ajith Ranabahu, and A. Sheth, "Service Level Agreement in Cloud Computing," OOPSLA, 2009.
    • (2009) OOPSLA
    • Patel, P.1    Ranabahu, A.2    Sheth, A.3
  • 8
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • R. Henning, "Security Service Level Agreements: Quantifiable Security for the Enterprise?," New Security Paradigms Wksp, 1999.
    • (1999) New Security Paradigms Wksp
    • Henning, R.1
  • 10
    • 18744395278 scopus 로고    scopus 로고
    • Modeling and tuning security from a quality of service perspective
    • S. Lindskog, "Modeling and Tuning Security from a Quality of Service Perspective," Chalmers Univ. Of Tech., 2005.
    • (2005) Chalmers Univ. of Tech.
    • Lindskog, S.1
  • 12
    • 77957951132 scopus 로고    scopus 로고
    • How to enhance cloud architectures to enable cross-federation
    • A. Celesti et al., "How to Enhance Cloud Architectures to Enable Cross-Federation," 3rd Int'l Conf. on Cloud Computing, 2010.
    • (2010) 3rd Int'l Conf. on Cloud Computing
    • Celesti, A.1
  • 14
    • 69849091288 scopus 로고    scopus 로고
    • Hybrid adaptive web service selection with SAWSDL-MX and WSDL-analyzer
    • L. Aroyo et al. eds. Springer
    • M. Klusch et al, "Hybrid Adaptive Web Service Selection with SAWSDL-MX and WSDL-Analyzer," The Semantic Web: Research and Applications vol. 5554, L. Aroyo et al. eds., pp. 550-564: Springer, 2009.
    • (2009) The Semantic Web: Research and Applications , vol.5554 , pp. 550-564
    • Klusch, M.1
  • 19
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • DOI 10.1109/TSE.2007.70754
    • C. Haley et al, "Security Requirements Engineering: A Framework for Representation and Analysis," Transactions on Software Engineering, vol. 34 no. 1, pp.133-153, 2008. (Pubitemid 351343906)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.2    Moffett, J.D.3    Nuseibeh, B.4
  • 21
    • 24144440792 scopus 로고    scopus 로고
    • An efficient algorithm for OWL-S based semantic search in UDDI
    • J. Cardoso et al. eds.
    • N. Srinivasan et al, "An Efficient Algorithm for OWL-S Based Semantic Search in UDDI," Semantic Web Services and Web Process Composition. vol. 3387, J. Cardoso et al. eds., pp. 96-110, 2005.
    • (2005) Semantic Web Services and Web Process Composition , vol.3387 , pp. 96-110
    • Srinivasan, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.