-
1
-
-
85184840384
-
Towards a model-driven provisioning, deployment, monitoring, and adaptation of multi-cloud systems
-
June In Cloud Computing (CLOUD), IEEE
-
Ferry, N., Rossini, A., Chauvel, F., Morin, B., & Solberg, A. (2013, June). Towards a model-driven provisioning, deployment, monitoring, and adaptation of multi-cloud systems. In Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on (pp. 887-894). IEEE.
-
(2013)
2013 IEEE Sixth International Conference on
, pp. 887-894
-
-
Ferry, N.1
Rossini, A.2
Chauvel, F.3
Morin, B.4
Solberg, A.5
-
2
-
-
84873619608
-
Collaboration in multicloud computing environments: Framework and security issues
-
Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G. J., & Bertino, E. (2013). Collaboration in multicloud computing environments: Framework and security issues. Computer, (2), 76-84.
-
(2013)
Computer
, vol.2
, pp. 76-84
-
-
Singhal, M.1
Chandrasekhar, S.2
Ge, T.3
Sandhu, R.4
Krishnan, R.5
Ahn, G.J.6
Bertino, E.7
-
3
-
-
70349755377
-
Blueprint for the intercloudprotocols and formats for cloud computing interoperability
-
May In Internet and Web Applications and Services, 2009 IEEE
-
Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., & Morrow, M. (2009, May). Blueprint for the intercloudprotocols and formats for cloud computing interoperability. In Internet and Web Applications and Services, 2009. ICIW'09. Fourth International Conference on (pp. 328-336). IEEE.
-
(2009)
ICIW'09. Fourth International Conference on
, pp. 328-336
-
-
Bernstein, D.1
Ludvigson, E.2
Sankar, K.3
Diamond, S.4
Morrow, M.5
-
4
-
-
77957951132
-
How to enhance cloud architectures to enable cross-federation
-
July Cloud Computing (CLOUD)
-
Celesti, A., Tusa, F., Villari, M., & Puliafito, A. (2010, July). How to enhance cloud architectures to enable cross-federation. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 337-345). IEEE.
-
(2010)
2010 IEEE 3rd International Conference on
, pp. 337-345
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
5
-
-
84897586246
-
Security and privacy-enhancing multicloud architectures
-
Bohli, J.-M., Gruschka, N., Jensen, M., Iacono, L. L., and Marnau, N. (2013). Security and Privacy-Enhancing Multicloud Architectures. IEEE Transactions on Dependable and Secure Computing, 10(4):212-224.
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.4
, pp. 212-224
-
-
Bohli, J.-M.1
Gruschka, N.2
Jensen, M.3
Iacono, L.L.4
Marnau, N.5
-
7
-
-
84893754378
-
Inter-Cloud architectures and application brokering: Taxonomy and survey
-
Nikolay Grozev and Buyya, R. (2012). Inter-Cloud architectures and application brokering: taxonomy and survey. Software - Practice and Experience, 44(3):369-390.
-
(2012)
Software - Practice and Experience
, vol.44
, Issue.3
, pp. 369-390
-
-
Grozev, N.1
Buyya, R.2
-
8
-
-
80054081474
-
Architecturing a sky computing platform
-
Cezon M, Wolfsthal Y (eds). Springer-Verlag: Ghent, Belgium
-
Petcu D, Crciun C, Neagul M, Panica S, Di Martino B, Venticinque S, Rak M, Aversa R. Architecturing a sky computing platform. In Proceedings of the International Conference Towards a Service-Based Internet Service Wave'10, Vol. 6569, Cezon M, Wolfsthal Y (eds). Springer-Verlag: Ghent, Belgium, 2011; 1-13.
-
(2011)
Proceedings of the International Conference Towards a Service-Based Internet Service Wave'10
, vol.6569
, pp. 1-13
-
-
Petcu, D.1
Crciun, C.2
Neagul, M.3
Panica, S.4
Di Martino, B.5
Venticinque, S.6
Rak, M.7
Aversa, R.8
-
9
-
-
80052790418
-
OPTIMIS: A holistic approach to cloud service provisioning
-
Ferrer AJ, Hernández F, Tordsson J, Elmroth E, Ali-Eldin A, Zsigri C, Sirvent R, Guitart J, Badia RM, Djemame K, Ziegler W, Dimitrakos T, Nair SK, Kousiouris G, Konstanteli K, Varvarigou T, Hudzia B, Kipp A, Wesner S, Corrales M, Forgó N, Sharif T, Sheridan C. OPTIMIS: a holistic approach to cloud service provisioning. Future Generation Computer Systems 2012; 28(1):66-77.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.1
, pp. 66-77
-
-
Ferrer, A.J.1
Hernández, F.2
Tordsson, J.3
Elmroth, E.4
Ali-Eldin, A.5
Zsigri, C.6
Sirvent, R.7
Guitart, J.8
Badia, R.M.9
Djemame, K.10
Ziegler, W.11
Dimitrakos, T.12
Nair, S.K.13
Kousiouris, G.14
Konstanteli, K.15
Varvarigou, T.16
Hudzia, B.17
Kipp, A.18
Wesner, S.19
Corrales, M.20
Forgó, N.21
Sharif, T.22
Sheridan, C.23
more..
-
10
-
-
84877650276
-
A user-centric multi-PaaS application management solution for hybrid multi-Cloud scenarios
-
Zeginis, D., D'Andria, F., Bocconi, S., Gorronogoitia Cruz, J., Collell Martin, O., Gouvas, P., Ledakis, G., and Tarabanis, K. a. (2013). A user-centric multi-PaaS application management solution for hybrid multi-Cloud scenarios. Scalable Computing: Practice and Experience, 14(1):17-32.
-
(2013)
Scalable Computing: Practice and Experience
, vol.14
, Issue.1
, pp. 17-32
-
-
Zeginis, D.1
D'Andria, F.2
Bocconi, S.3
Gorronogoitia Cruz, J.4
Collell Martin, O.5
Gouvas, P.6
Ledakis, G.7
Tarabanis, K.A.8
-
13
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multicloud storage
-
Yan, Z., Hongxin, H., Gail-Joon, A., and Mengyang, Y. (2012). Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Transactions on Parallel and Distributed Systems,,23(12):2231-2244.2
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.12
, pp. 2231-22442
-
-
Yan, Z.1
Hongxin, H.2
Gail-Joon, A.3
Mengyang, Y.4
-
14
-
-
79551628302
-
Trusted storage over untrusted networks
-
Oliveira, P. F., Lima, L., Vinhoza, T. T. V., Barros, J., and Medard, M. (2010). Trusted Storage over Untrusted Networks. Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, pages 1-5.
-
(2010)
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
, pp. 1-5
-
-
Oliveira, P.F.1
Lima, L.2
Vinhoza, T.T.V.3
Barros, J.4
Medard, M.5
-
16
-
-
84885645251
-
Experiences threat modeling at Microsoft
-
Shostack, A. (2008). Experiences threat modeling at Microsoft. CEUR Workshop Proceedings, 413:1{11.
-
(2008)
CEUR Workshop Proceedings
, vol.413
, Issue.1
, pp. 11
-
-
Shostack, A.1
-
17
-
-
80054081474
-
Threat modeling using attack trees
-
(APRIL)
-
Saini, V., Duan, Q., and Paruchuri, V. (2008). Threat modeling using attack trees. Journal of Computing Sciences, (APRIL):124-131.
-
(2008)
Journal of Computing Sciences
, pp. 124-131
-
-
Saini, V.1
Duan, Q.2
Paruchuri, V.3
-
18
-
-
38049161526
-
Security threat modeling and analysis: A goal-oriented approach
-
Oladimeji, E. a., Supakkul, S., and Chung, L. (2006). Security threat modeling and analysis: A goal-oriented approach. Proc of the 10th IASTED International Conference on Software Engineering and Applications SEA 2006, pages 13-15.
-
(2006)
Proc of the 10th IASTED International Conference on Software Engineering and Applications SEA 2006
, pp. 13-15
-
-
Oladimeji, E.A.1
Supakkul, S.2
Chung, L.3
-
19
-
-
70350778315
-
Threat modeling using fuzzy logic paradigm
-
Sodiya, A. S., Onashoga, S. A., and Oladunjoye, B. A. (2007). Threat modeling using fuzzy logic paradigm. Informing Science: International Journal of an Emerging Transdiscipline, 4(1):53-61.
-
(2007)
Informing Science: International Journal of an Emerging Transdiscipline
, vol.4
, Issue.1
, pp. 53-61
-
-
Sodiya, A.S.1
Onashoga, S.A.2
Oladunjoye, B.A.3
-
20
-
-
85017415126
-
-
Hussain, S., Kamal, A., Ahmad, S., Rasool, G., and Iqbal, S. (2014). Threat Modelling Methodologies: a Survey. 26(4):1607-1609.
-
(2014)
Threat Modelling Methodologies: A Survey
, vol.26
, Issue.4
, pp. 1607-1609
-
-
Hussain, S.1
Kamal, A.2
Ahmad, S.3
Rasool, G.4
Iqbal, S.5
-
21
-
-
84964822727
-
Security requirements for the rest of us: A survey
-
Tondel, I. A., Jaatun, M. G., and Meland, P. H. (2008). Security requirements for the rest of us: A survey. IEEE Software, 25(1):20-27.
-
(2008)
IEEE Software
, vol.25
, Issue.1
, pp. 20-27
-
-
Tondel, I.A.1
Jaatun, M.G.2
Meland, P.H.3
-
22
-
-
84979761212
-
-
Open Web Application Security Project (OWASP). Application Threat Modeling. Available at: https://www.owasp.org/index.php/Application-Threat-Modeling
-
Application Threat Modeling
-
-
-
23
-
-
84962219790
-
-
EU directive 95/46/EC. Available at: http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
-
EU Directive 95/46/EC
-
-
-
25
-
-
84971348067
-
SP 800-53 Rev.4 - Security and Privacy Controls for Federal Information Systems and Organizations
-
National Institute of Standards and Technology (NIST), "SP 800-53 Rev.4 - Security and Privacy Controls for Federal Information Systems and Organizations," Natl. Inst. Stand. Technol. - Spec. Publ., vol. 800-53, pp. 1-460, 2014.
-
(2014)
Natl. Inst. Stand. Technol.
, vol.800
, Issue.53
, pp. 1-460
-
-
-
26
-
-
84864535108
-
-
Aug.
-
Cloud Security Alliance, "Cloud Controls Matrix, Version 1.2", Aug. 2011; https://cloudsecurityalliance.org/research/initiativesccm.
-
(2011)
Cloud Controls Matrix, Version 1.2
-
-
-
28
-
-
84937690427
-
Leveraging the potential of cloud security service level agreements through standards
-
July
-
Jesus Luna, Neeraj Suri, Michaela Iorga and Anil Kamel, "Leveraging the Potential of Cloud Security Service Level Agreements through Standards", IEEE Cloud Computing Magazine, Volume 2, Issue 3, Pages 32-40, July 2015
-
(2015)
IEEE Cloud Computing Magazine
, vol.2
, Issue.3
, pp. 32-40
-
-
Luna, J.1
Suri, N.2
Iorga, M.3
Kamel, A.4
-
29
-
-
85037028287
-
SLA-based secure cloud application development: The SPECS framework
-
21-22 September
-
Valentina Casola, Alessandra De benedictis, Massimiliano Rak and Umberto Villano, "SLA-based Secure Cloud Application Development: the SPECS Framework", In MICAS 2015, Timisoara, 21-22 September 2015.
-
(2015)
MICAS 2015, Timisoara
-
-
Casola, V.1
De Benedictis, A.2
Rak, M.3
Villano, U.4
-
30
-
-
85037051129
-
Cloud security requirements
-
Norway, 2015
-
Bernsmed, K., Hakon Meland, P., Gilje Jaatun, M. (2015). Cloud Security Requirements. SINTEF ICT, Norway, 2015
-
(2015)
SINTEF ICT
-
-
Bernsmed, K.1
Hakon Meland, P.2
Gilje Jaatun, M.3
|