메뉴 건너뛰기




Volumn 72, Issue , 2017, Pages 193-205

A novel approach to manage cloud security SLA incidents

Author keywords

Cloud computing; Cloud security; Security SLAs; SLA monitoring; SLA remediation

Indexed keywords

CLOUD COMPUTING; PUBLIC ADMINISTRATION; QUALITY OF SERVICE; WEB SERVICES;

EID: 85006372420     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.06.004     Document Type: Article
Times cited : (23)

References (51)
  • 1
    • 84938263590 scopus 로고    scopus 로고
    • Cloud adoption practices & priorities Survey Report
    • CSA Available online (last accessed in October 2015)
    • [1] Coles, C., Yeoh, J., Cloud adoption practices & priorities Survey Report., 2015, CSA Available online https://downloads.cloudsecurityalliance.org/initiatives/surveys/capp/Cloud_Adoption_Practices_Priorities_Survey_Final.pdf (last accessed in October 2015).
    • (2015)
    • Coles, C.1    Yeoh, J.2
  • 2
    • 85017732707 scopus 로고    scopus 로고
    • KPMG
    • Available online (last accessed in October 2015)
    • [2] KPMG, Cloud Survey Report: Elevating Business in the Cloud, 2014. Available online https://www.kpmg.com/PL/pl/IssuesAndInsights/ArticlesPublications/Documents/2015/2014-KPMG-Cloud-Survey-Report-online-secured.pdf (last accessed in October 2015).
    • (2014) Cloud Survey Report: Elevating Business in the Cloud
  • 3
    • 85017744306 scopus 로고    scopus 로고
    • Why Eurocontrol built a cloud, Available online (last accessed in October 2015)
    • [3] Skyway Magazine by Eurocontrol, Why Eurocontrol built a cloud, 2013. Available online http://www.eurocontrol.int/sites/default/files/content/documents/official-documents/skyway/articles/2013-spring-skyway-focus-why-ecl-built-a-cloud.pdf (last accessed in October 2015).
    • (2013) Skyway Magazine by Eurocontrol
  • 4
    • 85017746668 scopus 로고    scopus 로고
    • (last accessed in October 2015)
    • [4] SESAR project. http://ec.europa.eu/transport/modes/air/sesar/index_en.htm (last accessed in October 2015).
    • SESAR project
  • 5
    • 84937680865 scopus 로고    scopus 로고
    • Available online (last accessed in October 2015)
    • [5] M. Dekker, Security Framework for Governmental Clouds—ENISA, 2015. Available online https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/governmental-cloud-security/security-framework-for-govenmental-clouds (last accessed in October 2015).
    • (2015) Security Framework for Governmental Clouds—ENISA
    • Dekker, M.1
  • 6
    • 85017736178 scopus 로고    scopus 로고
    • Guidelines on information security controls for the use of cloud computing services based on ISOIEC 27002
    • [6] International Organization for Standardization, Guidelines on information security controls for the use of cloud computing services based on ISOIEC 27002, 2014.
    • (2014) International Organization for Standardization
  • 7
    • 85017737193 scopus 로고    scopus 로고
    • Cloud Controls Matrix v3.0.1. Available online (last accessed in October)
    • [7] Cloud Security Alliance, Cloud Controls Matrix v3.0.1. Available online https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3-0-1/ (last accessed in October 2015).
    • (2015) Cloud Security Alliance
  • 9
    • 84937690427 scopus 로고    scopus 로고
    • Leveraging the potential of cloud security service-level agreements through standards
    • [9] Luna, J., Suri, N., Iorga, M., Karmel, A., Leveraging the potential of cloud security service-level agreements through standards. IEEE Cloud Comput. Mag. 2:3 (2015), 32–40.
    • (2015) IEEE Cloud Comput. Mag. , vol.2 , Issue.3 , pp. 32-40
    • Luna, J.1    Suri, N.2    Iorga, M.3    Karmel, A.4
  • 12
    • 85017738633 scopus 로고    scopus 로고
    • European Commission
    • C-SIG SLA, 2014. Available online (last accessed in October 2015)
    • [12] European Commission, Cloud service level agreement standardization guidelines, C-SIG SLA 2014, 2014. Available online http://ec.europa.eu/digital-agenda/en/news/cloud-service-level-agreement-standardisation-guidelines (last accessed in October 2015).
    • (2014) Cloud service level agreement standardization guidelines
  • 15
    • 85017728385 scopus 로고    scopus 로고
    • SPECS
    • Available online (last accessed in April 2016)
    • [15] SPECS, SPECS Team Bitbucket Account, 2015. Available online https://bitbucket.org/specs-team/ (last accessed in April 2016).
    • (2015) SPECS Team Bitbucket Account
  • 16
    • 78650025772 scopus 로고    scopus 로고
    • Information Security Policy—A Development Guide for Large and Small Companies
    • SANS Institute Available online (last accessed in October 2015)
    • [16] Diver, S., Information Security Policy—A Development Guide for Large and Small Companies. 2007, SANS Institute Available online https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331 (last accessed in October 2015).
    • (2007)
    • Diver, S.1
  • 17
    • 84867659942 scopus 로고    scopus 로고
    • Meaningful security SLAs, Technical Report
    • HP Laboratories Available online (last accessed in October 2015)
    • [17] Monahan, B., Yearwort, M., Meaningful security SLAs, Technical Report., 2008, HP Laboratories Available online http://www.hpl.hp.com/techreports/2005/HPL-2005-218R1.pdf (last accessed in October 2015).
    • (2008)
    • Monahan, B.1    Yearwort, M.2
  • 19
    • 85017730613 scopus 로고    scopus 로고
    • Cloud Security Alliance
    • Available online (last accessed in October 2015)
    • [19] Cloud Security Alliance, Security, Trust & Assurance Registry (STAR). Available online https://cloudsecurityalliance.org/star/ (last accessed in October 2015).
    • (2015) Security, Trust & Assurance Registry (STAR)
  • 23
    • 78149392139 scopus 로고    scopus 로고
    • On the feasibility of utilizing security metrics in software-intensive systems
    • [23] Savola, R.M., On the feasibility of utilizing security metrics in software-intensive systems. Int. J. Comput. Sci. Network Secur. (IJCSNS) 10:1 (2010), 230–239.
    • (2010) Int. J. Comput. Sci. Network Secur. (IJCSNS) , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.M.1
  • 24
    • 84869744829 scopus 로고    scopus 로고
    • Benchmarking cloud security level agreements using quantitative policy trees
    • [24] J. Luna, R. Langenberg, N. Suri, Benchmarking cloud security level agreements using quantitative policy trees, in: ACM Workshop on Cloud computing security, 2012, pp. 103–112.
    • (2012) ACM Workshop on Cloud computing security , pp. 103-112
    • Luna, J.1    Langenberg, R.2    Suri, N.3
  • 25
    • 23844470859 scopus 로고    scopus 로고
    • A reference model for security level evaluation: Policy and fuzzy techniques
    • [25] Casola, V., Preziosi, R., Rak, M., Troiano, L., A reference model for security level evaluation: Policy and fuzzy techniques. J. UCS, 2005, 150–174.
    • (2005) J. UCS , pp. 150-174
    • Casola, V.1    Preziosi, R.2    Rak, M.3    Troiano, L.4
  • 26
    • 85017738997 scopus 로고    scopus 로고
    • Available online (last accessed in October 2015)
    • [26] E. Novikoff, The role of remote monitoring in Cloud Computing, 2014. Available online http://enki.co/blog/the-role-of-remote-monitoring-in-cloud-computing.html (last accessed in October 2015).
    • (2014) The role of remote monitoring in Cloud Computing
    • Novikoff, E.1
  • 28
    • 85017742384 scopus 로고    scopus 로고
    • Nagios. (last accessed in October 2015)
    • [28] Nagios. http://www.nagios.org/ (last accessed in October 2015).
    • (2015)
  • 29
    • 85015152276 scopus 로고    scopus 로고
    • (last accessed in October)
    • [29] Amazon CloudWatch. http://aws.amazon.com/cloudwatch/ (last accessed in October 2015).
    • (2015) Amazon CloudWatch
  • 31
    • 85017743064 scopus 로고    scopus 로고
    • The security Onion Cloud Client—Network Security Monitoring for the Cloud
    • SANS Institute Available online (last accessed in October 2015)
    • [31] Brower, J., The security Onion Cloud Client—Network Security Monitoring for the Cloud. 2013, SANS Institute Available online https://www.sans.org/reading-room/whitepapers/cloud/security-onion-cloud-client-network-security-monitoring-cloud-34335 (last accessed in October 2015).
    • (2013)
    • Brower, J.1
  • 32
    • 84980029374 scopus 로고    scopus 로고
    • Available online (last accessed in October 2015)
    • [32] N. Kroes, Cyber Security—A shared responsibility, 2012. Available online http://europa.eu/rapid/press-release_SPEECH-12-774_en.htm (last accessed in October 2015).
    • (2012) Cyber Security—A shared responsibility
    • Kroes, N.1
  • 33
    • 85017739123 scopus 로고    scopus 로고
    • CSA
    • Available online (last ccessed in October)
    • [33] CSA, Cloud Trust Protocol. Available online https://cloudsecurityalliance.org/research/ctp/ (last ccessed in October 2015).
    • (2015) Cloud Trust Protocol
  • 38
    • 85017742454 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • Available online (last accessed in October 2015)
    • [38] National Institute of Standards and Technology, Cloud Computing: Cloud Service Metrics Description, NIST Public RATAX EG draft document, 2014. Available online http://www.nist.gov/itl/cloud/upload/RATAX-CloudServiceMetricsDescription-DRAFT-20141111.pdf (last accessed in October 2015).
    • (2014) Cloud Computing: Cloud Service Metrics Description, NIST Public RATAX EG draft document
  • 39
    • 85032613185 scopus 로고    scopus 로고
    • Quantitative reasoning about cloud security using service level agreements
    • Available online (last accessed in April 2016)
    • [39] Luna, J., Taha, A., Trapero, R., Suri, N., Quantitative reasoning about cloud security using service level agreements. IEEE Trans. Cloud Comput., 99, 2015 Available online http://www1.deeds.informatik.tu-darmstadt.de/External/PublicationData/0/TCC_secSLA_2014.pdf (last accessed in April 2016).
    • (2015) IEEE Trans. Cloud Comput. , vol.99
    • Luna, J.1    Taha, A.2    Trapero, R.3    Suri, N.4
  • 40
    • 85017738968 scopus 로고    scopus 로고
    • Cloud Security Alliance
    • Available online (last accessed in October 2015)
    • [40] Cloud Security Alliance, The Consensus Assessments Initiative Questionnaire, 2011. Available online https://cloudsecurityalliance.org/group/consensus-assessments/ (last accessed in October 2015).
    • (2011) The Consensus Assessments Initiative Questionnaire
  • 41
    • 80052586939 scopus 로고    scopus 로고
    • (last accessed in April)
    • [41] Amazon Web Services (AWS). https://aws.amazon.com/ (last accessed in April 2016).
    • (2016) Amazon Web Services (AWS)
  • 42
    • 84870639734 scopus 로고    scopus 로고
    • (last accessed in April)
    • [42] Microsoft Azure. https://azure.microsoft.com/en-us/ (last accessed in April 2016).
    • (2016) Microsoft Azure
  • 45
    • 85017731659 scopus 로고    scopus 로고
    • Micro Focus
    • Available online (last accessed in October 2015)
    • [45] Micro Focus, OVAL Information, 2015. Available online https://support.novell.com/security/oval/ (last accessed in October 2015).
    • (2015) OVAL Information
  • 47
    • 85017737406 scopus 로고    scopus 로고
    • Available online. (last accessed in October 2015)
    • [47] Chef, An Overview of Chef, 2009. Available online. https://docs.chef.io/chef_overview.html (last accessed in October 2015).
    • (2009) Chef, An Overview of Chef
  • 48
    • 85017727493 scopus 로고    scopus 로고
    • Puppet Labs
    • Available online (last accessed in October 2015)
    • [48] Puppet Labs, Puppet Enterprise Overview, 2005. Available online http://docs.puppetlabs.com/pe/latest/overview_about_pe.html (last accessed in October 2015).
    • (2005) Puppet Enterprise Overview
  • 49
    • 85017731099 scopus 로고    scopus 로고
    • Available online (last accessed in October 2015)
    • [49] SaltStack, SaltStack Walkthrough, 2011. Available online https://docs.saltstack.com/en/latest/topics/tutorials/walkthrough.html (last accessed in October 2015).
    • (2011) SaltStack, SaltStack Walkthrough
  • 50
    • 85017745595 scopus 로고    scopus 로고
    • Available online (last accessed in October 2015)
    • [50] Ansible, Ansible documentation, 2015. Available online http://docs.ansible.com/ansible/index.html (last accessed in October 2015).
    • (2015) Ansible, Ansible documentation


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.