-
1
-
-
84938263590
-
Cloud adoption practices & priorities Survey Report
-
CSA Available online (last accessed in October 2015)
-
[1] Coles, C., Yeoh, J., Cloud adoption practices & priorities Survey Report., 2015, CSA Available online https://downloads.cloudsecurityalliance.org/initiatives/surveys/capp/Cloud_Adoption_Practices_Priorities_Survey_Final.pdf (last accessed in October 2015).
-
(2015)
-
-
Coles, C.1
Yeoh, J.2
-
2
-
-
85017732707
-
KPMG
-
Available online (last accessed in October 2015)
-
[2] KPMG, Cloud Survey Report: Elevating Business in the Cloud, 2014. Available online https://www.kpmg.com/PL/pl/IssuesAndInsights/ArticlesPublications/Documents/2015/2014-KPMG-Cloud-Survey-Report-online-secured.pdf (last accessed in October 2015).
-
(2014)
Cloud Survey Report: Elevating Business in the Cloud
-
-
-
3
-
-
85017744306
-
-
Why Eurocontrol built a cloud, Available online (last accessed in October 2015)
-
[3] Skyway Magazine by Eurocontrol, Why Eurocontrol built a cloud, 2013. Available online http://www.eurocontrol.int/sites/default/files/content/documents/official-documents/skyway/articles/2013-spring-skyway-focus-why-ecl-built-a-cloud.pdf (last accessed in October 2015).
-
(2013)
Skyway Magazine by Eurocontrol
-
-
-
4
-
-
85017746668
-
-
(last accessed in October 2015)
-
[4] SESAR project. http://ec.europa.eu/transport/modes/air/sesar/index_en.htm (last accessed in October 2015).
-
SESAR project
-
-
-
5
-
-
84937680865
-
-
Available online (last accessed in October 2015)
-
[5] M. Dekker, Security Framework for Governmental Clouds—ENISA, 2015. Available online https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/governmental-cloud-security/security-framework-for-govenmental-clouds (last accessed in October 2015).
-
(2015)
Security Framework for Governmental Clouds—ENISA
-
-
Dekker, M.1
-
6
-
-
85017736178
-
Guidelines on information security controls for the use of cloud computing services based on ISOIEC 27002
-
[6] International Organization for Standardization, Guidelines on information security controls for the use of cloud computing services based on ISOIEC 27002, 2014.
-
(2014)
International Organization for Standardization
-
-
-
7
-
-
85017737193
-
-
Cloud Controls Matrix v3.0.1. Available online (last accessed in October)
-
[7] Cloud Security Alliance, Cloud Controls Matrix v3.0.1. Available online https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3-0-1/ (last accessed in October 2015).
-
(2015)
Cloud Security Alliance
-
-
-
9
-
-
84937690427
-
Leveraging the potential of cloud security service-level agreements through standards
-
[9] Luna, J., Suri, N., Iorga, M., Karmel, A., Leveraging the potential of cloud security service-level agreements through standards. IEEE Cloud Comput. Mag. 2:3 (2015), 32–40.
-
(2015)
IEEE Cloud Comput. Mag.
, vol.2
, Issue.3
, pp. 32-40
-
-
Luna, J.1
Suri, N.2
Iorga, M.3
Karmel, A.4
-
12
-
-
85017738633
-
European Commission
-
C-SIG SLA, 2014. Available online (last accessed in October 2015)
-
[12] European Commission, Cloud service level agreement standardization guidelines, C-SIG SLA 2014, 2014. Available online http://ec.europa.eu/digital-agenda/en/news/cloud-service-level-agreement-standardisation-guidelines (last accessed in October 2015).
-
(2014)
Cloud service level agreement standardization guidelines
-
-
-
13
-
-
84899752948
-
Security as a service using an SLA-based approach via SPECS
-
IEEE
-
[13] Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V., Villano, U., Security as a service using an SLA-based approach via SPECS. Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science, CloudComp, 2013, IEEE, 1–6.
-
(2013)
Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science, CloudComp
, pp. 1-6
-
-
Rak, M.1
Suri, N.2
Luna, J.3
Petcu, D.4
Casola, V.5
Villano, U.6
-
15
-
-
85017728385
-
SPECS
-
Available online (last accessed in April 2016)
-
[15] SPECS, SPECS Team Bitbucket Account, 2015. Available online https://bitbucket.org/specs-team/ (last accessed in April 2016).
-
(2015)
SPECS Team Bitbucket Account
-
-
-
16
-
-
78650025772
-
Information Security Policy—A Development Guide for Large and Small Companies
-
SANS Institute Available online (last accessed in October 2015)
-
[16] Diver, S., Information Security Policy—A Development Guide for Large and Small Companies. 2007, SANS Institute Available online https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331 (last accessed in October 2015).
-
(2007)
-
-
Diver, S.1
-
17
-
-
84867659942
-
Meaningful security SLAs, Technical Report
-
HP Laboratories Available online (last accessed in October 2015)
-
[17] Monahan, B., Yearwort, M., Meaningful security SLAs, Technical Report., 2008, HP Laboratories Available online http://www.hpl.hp.com/techreports/2005/HPL-2005-218R1.pdf (last accessed in October 2015).
-
(2008)
-
-
Monahan, B.1
Yearwort, M.2
-
18
-
-
80052556562
-
Security in service level agreements for cloud computing
-
[18] A. Undheim, K. Bernsmed, M.G. Jaatun, Security in service level agreements for cloud computing, in: Proceedings of the 1st International Conference on Cloud Computing and Services Science, CLOSER 2011, 2011, pp. 636–642.
-
(2011)
Proceedings of the 1st International Conference on Cloud Computing and Services Science, CLOSER
, vol.2011
, pp. 636-642
-
-
Undheim, A.1
Bernsmed, K.2
Jaatun, M.G.3
-
19
-
-
85017730613
-
Cloud Security Alliance
-
Available online (last accessed in October 2015)
-
[19] Cloud Security Alliance, Security, Trust & Assurance Registry (STAR). Available online https://cloudsecurityalliance.org/star/ (last accessed in October 2015).
-
(2015)
Security, Trust & Assurance Registry (STAR)
-
-
-
20
-
-
84882690392
-
A SLA evaluation methodology in service oriented architectures
-
[20] V. Casola, A. Mazzeo, N. Mazzocca, M. Rak, A SLA evaluation methodology in service oriented architectures, in: Proceedings of the 2nd ACM Workshop on Quality of Protection, QOP 2006, 2006, pp. 119–130.
-
(2006)
Proceedings of the 2nd ACM Workshop on Quality of Protection, QOP
, vol.2006
, pp. 119-130
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Rak, M.4
-
21
-
-
80052459657
-
A security metrics framework for the cloud
-
[21] J. Luna, H. Ghani, D. Germanus, N. Suri, A security metrics framework for the cloud, in: Proceedings of the 6th International Conference on Security and Cryptography, SECRYPT 2011, 2011, pp. 245–250.
-
(2011)
Proceedings of the 6th International Conference on Security and Cryptography, SECRYPT
, vol.2011
, pp. 245-250
-
-
Luna, J.1
Ghani, H.2
Germanus, D.3
Suri, N.4
-
22
-
-
84922962668
-
AHP-based quantitative approach for assessing and comparing cloud security
-
[22] A. Taha, R. Trapero, J. Luna, N. Suri, AHP-based quantitative approach for assessing and comparing cloud security, in: Proceedings of Trust, Security and Privacy in Computing and Communications, 2014, pp. 284–291.
-
(2014)
Proceedings of Trust, Security and Privacy in Computing and Communications
, pp. 284-291
-
-
Taha, A.1
Trapero, R.2
Luna, J.3
Suri, N.4
-
23
-
-
78149392139
-
On the feasibility of utilizing security metrics in software-intensive systems
-
[23] Savola, R.M., On the feasibility of utilizing security metrics in software-intensive systems. Int. J. Comput. Sci. Network Secur. (IJCSNS) 10:1 (2010), 230–239.
-
(2010)
Int. J. Comput. Sci. Network Secur. (IJCSNS)
, vol.10
, Issue.1
, pp. 230-239
-
-
Savola, R.M.1
-
24
-
-
84869744829
-
Benchmarking cloud security level agreements using quantitative policy trees
-
[24] J. Luna, R. Langenberg, N. Suri, Benchmarking cloud security level agreements using quantitative policy trees, in: ACM Workshop on Cloud computing security, 2012, pp. 103–112.
-
(2012)
ACM Workshop on Cloud computing security
, pp. 103-112
-
-
Luna, J.1
Langenberg, R.2
Suri, N.3
-
25
-
-
23844470859
-
A reference model for security level evaluation: Policy and fuzzy techniques
-
[25] Casola, V., Preziosi, R., Rak, M., Troiano, L., A reference model for security level evaluation: Policy and fuzzy techniques. J. UCS, 2005, 150–174.
-
(2005)
J. UCS
, pp. 150-174
-
-
Casola, V.1
Preziosi, R.2
Rak, M.3
Troiano, L.4
-
26
-
-
85017738997
-
-
Available online (last accessed in October 2015)
-
[26] E. Novikoff, The role of remote monitoring in Cloud Computing, 2014. Available online http://enki.co/blog/the-role-of-remote-monitoring-in-cloud-computing.html (last accessed in October 2015).
-
(2014)
The role of remote monitoring in Cloud Computing
-
-
Novikoff, E.1
-
28
-
-
85017742384
-
-
Nagios. (last accessed in October 2015)
-
[28] Nagios. http://www.nagios.org/ (last accessed in October 2015).
-
(2015)
-
-
-
29
-
-
85015152276
-
-
(last accessed in October)
-
[29] Amazon CloudWatch. http://aws.amazon.com/cloudwatch/ (last accessed in October 2015).
-
(2015)
Amazon CloudWatch
-
-
-
30
-
-
85017739673
-
DeSVi
-
Proceedings of the 2nd International ICST Conference on Cloud Computing, CloudComp 2010
-
[30] V.C. Emeakaroha, R.N. Calheiros, M.A.S. Netto, I. Brandic, C.A.F. De Rose, DeSVi: An architecture for detecting sla violations in cloud computing infrastructures, in: Proceedings of the 2nd International ICST Conference on Cloud Computing, CloudComp 2010, 2010.
-
(2010)
An architecture for detecting sla violations in cloud computing infrastructures
-
-
Emeakaroha, V.C.1
Calheiros, R.N.2
Netto, M.A.S.3
Brandic, I.4
De Rose, C.A.F.5
-
31
-
-
85017743064
-
The security Onion Cloud Client—Network Security Monitoring for the Cloud
-
SANS Institute Available online (last accessed in October 2015)
-
[31] Brower, J., The security Onion Cloud Client—Network Security Monitoring for the Cloud. 2013, SANS Institute Available online https://www.sans.org/reading-room/whitepapers/cloud/security-onion-cloud-client-network-security-monitoring-cloud-34335 (last accessed in October 2015).
-
(2013)
-
-
Brower, J.1
-
32
-
-
84980029374
-
-
Available online (last accessed in October 2015)
-
[32] N. Kroes, Cyber Security—A shared responsibility, 2012. Available online http://europa.eu/rapid/press-release_SPEECH-12-774_en.htm (last accessed in October 2015).
-
(2012)
Cyber Security—A shared responsibility
-
-
Kroes, N.1
-
33
-
-
85017739123
-
CSA
-
Available online (last ccessed in October)
-
[33] CSA, Cloud Trust Protocol. Available online https://cloudsecurityalliance.org/research/ctp/ (last ccessed in October 2015).
-
(2015)
Cloud Trust Protocol
-
-
-
34
-
-
78649874009
-
Laysi: A layered approach for sla-violation propagation in self-manageable cloud infrastructures
-
[34] I. Brandic, V.C. Emeakaroha, M. Maurer, S. Dustdar, S. Acs, A. Kertesz, G. Kecskemeti, Laysi: A layered approach for sla-violation propagation in self-manageable cloud infrastructures, in: Proceedings of the 2010 IEEE 34th Annual IEEE Computer Software and Applications Conference Workshops, COMPSACW, 2010, pp. 365–370.
-
(2010)
Proceedings of the 2010 IEEE 34th Annual IEEE Computer Software and Applications Conference Workshops, COMPSACW
, pp. 365-370
-
-
Brandic, I.1
Emeakaroha, V.C.2
Maurer, M.3
Dustdar, S.4
Acs, S.5
Kertesz, A.6
Kecskemeti, G.7
-
35
-
-
84885372083
-
Managing violations in service level agreements
-
Springer US
-
[35] Rana, O.F., Warnier, M., Quillinan, T.B., Brazier, F., Cojocarasu, D., Managing violations in service level agreements. Grid Middleware and Services, 2008, Springer, US, 349–358.
-
(2008)
Grid Middleware and Services
, pp. 349-358
-
-
Rana, O.F.1
Warnier, M.2
Quillinan, T.B.3
Brazier, F.4
Cojocarasu, D.5
-
36
-
-
84910084074
-
Policy-based adaptive service level agreement management for cloud services
-
IEEE
-
[36] Zhang, Z., Liao, L., Liu, H., Li, G., Policy-based adaptive service level agreement management for cloud services. Proceedings of the 2014 5th IEEE International Conference on Software Engineering and Service Science, ICSESS, 2014, IEEE, 496–499.
-
(2014)
Proceedings of the 2014 5th IEEE International Conference on Software Engineering and Service Science, ICSESS
, pp. 496-499
-
-
Zhang, Z.1
Liao, L.2
Liu, H.3
Li, G.4
-
38
-
-
85017742454
-
National Institute of Standards and Technology
-
Available online (last accessed in October 2015)
-
[38] National Institute of Standards and Technology, Cloud Computing: Cloud Service Metrics Description, NIST Public RATAX EG draft document, 2014. Available online http://www.nist.gov/itl/cloud/upload/RATAX-CloudServiceMetricsDescription-DRAFT-20141111.pdf (last accessed in October 2015).
-
(2014)
Cloud Computing: Cloud Service Metrics Description, NIST Public RATAX EG draft document
-
-
-
39
-
-
85032613185
-
Quantitative reasoning about cloud security using service level agreements
-
Available online (last accessed in April 2016)
-
[39] Luna, J., Taha, A., Trapero, R., Suri, N., Quantitative reasoning about cloud security using service level agreements. IEEE Trans. Cloud Comput., 99, 2015 Available online http://www1.deeds.informatik.tu-darmstadt.de/External/PublicationData/0/TCC_secSLA_2014.pdf (last accessed in April 2016).
-
(2015)
IEEE Trans. Cloud Comput.
, vol.99
-
-
Luna, J.1
Taha, A.2
Trapero, R.3
Suri, N.4
-
40
-
-
85017738968
-
Cloud Security Alliance
-
Available online (last accessed in October 2015)
-
[40] Cloud Security Alliance, The Consensus Assessments Initiative Questionnaire, 2011. Available online https://cloudsecurityalliance.org/group/consensus-assessments/ (last accessed in October 2015).
-
(2011)
The Consensus Assessments Initiative Questionnaire
-
-
-
41
-
-
80052586939
-
-
(last accessed in April)
-
[41] Amazon Web Services (AWS). https://aws.amazon.com/ (last accessed in April 2016).
-
(2016)
Amazon Web Services (AWS)
-
-
-
42
-
-
84870639734
-
-
(last accessed in April)
-
[42] Microsoft Azure. https://azure.microsoft.com/en-us/ (last accessed in April 2016).
-
(2016)
Microsoft Azure
-
-
-
44
-
-
84979582909
-
Towards a proof-based SLA management framework—the SPECS approach
-
CLOSER, January
-
[44] M. Stopar, J. Modic, D. Petcu, M. Rak, Towards a proof-based SLA management framework—the SPECS approach, in: Proceedings of the 2016 6th International Conference on Cloud Computing and Services Science, CLOSER, January 2016. http://dx.doi.org/10.5220/0005771302400248.
-
(2016)
Proceedings of the 2016 6th International Conference on Cloud Computing and Services Science
-
-
Stopar, M.1
Modic, J.2
Petcu, D.3
Rak, M.4
-
45
-
-
85017731659
-
Micro Focus
-
Available online (last accessed in October 2015)
-
[45] Micro Focus, OVAL Information, 2015. Available online https://support.novell.com/security/oval/ (last accessed in October 2015).
-
(2015)
OVAL Information
-
-
-
47
-
-
85017737406
-
-
Available online. (last accessed in October 2015)
-
[47] Chef, An Overview of Chef, 2009. Available online. https://docs.chef.io/chef_overview.html (last accessed in October 2015).
-
(2009)
Chef, An Overview of Chef
-
-
-
48
-
-
85017727493
-
Puppet Labs
-
Available online (last accessed in October 2015)
-
[48] Puppet Labs, Puppet Enterprise Overview, 2005. Available online http://docs.puppetlabs.com/pe/latest/overview_about_pe.html (last accessed in October 2015).
-
(2005)
Puppet Enterprise Overview
-
-
-
49
-
-
85017731099
-
-
Available online (last accessed in October 2015)
-
[49] SaltStack, SaltStack Walkthrough, 2011. Available online https://docs.saltstack.com/en/latest/topics/tutorials/walkthrough.html (last accessed in October 2015).
-
(2011)
SaltStack, SaltStack Walkthrough
-
-
-
50
-
-
85017745595
-
-
Available online (last accessed in October 2015)
-
[50] Ansible, Ansible documentation, 2015. Available online http://docs.ansible.com/ansible/index.html (last accessed in October 2015).
-
(2015)
Ansible, Ansible documentation
-
-
|