Towards Continuous Cloud Service Assurance for Critical Infrastructure IT
暂无分享,去创建一个
Andreas Mauthe | Markus Tauber | Aleksandar Hudic | Thomas Hecht | Santiago Cáceres Elvira | Aleksandar Hudic | Thom Hecht | A. Mauthe | Markus Tauber | Santiago Cáceres Elvira
[1] George Spanoudakis,et al. Translation of SLAs into Monitoring Specifications , 2011 .
[2] George Spanoudakis,et al. The SERENITY Runtime Monitoring Framework , 2009, Security and Dependability for Ambient Intelligence.
[3] Khaled Mahbub,et al. Incremental certification of cloud services , 2013, SECURWARE 2013.
[4] Frank Pallas,et al. An Architectural Model for Deploying Critical Infrastructure Services in the Cloud , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[5] Ramin Yahyapour,et al. Service Level Agreements for Cloud Computing , 2011 .
[6] Cynthia E. Irvine,et al. MYSEA: the monterey security architecture , 2009, STC '09.
[7] Rajkumar Buyya,et al. Service Level Agreement (SLA) in Utility Computing Systems , 2010, ArXiv.
[8] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[9] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[10] Siani Pearson,et al. Toward Accountability in the Cloud , 2011, IEEE Internet Computing.
[11] Markus Tauber,et al. Trustworthy evidence gathering mechanism for multilayer cloud compliance , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
[12] Siani Pearson,et al. Accountability for Data Governance in Cloud Ecosystems , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[13] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[14] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[15] R. Smith,et al. Department of Defense. , 2020, Military medicine.
[16] Yufang Yang,et al. The semantic blocking effect in word naming task: Evidence from Chinese classifier-noun phrase production , 2013, 2013 IEEE Third International Conference on Information Science and Technology (ICIST).
[17] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[18] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[19] George Spanoudakis,et al. Advanced service monitoring configurations with SLA decomposition and selection , 2011, SAC '11.
[20] Bartolomeo Sapio. Certification infrastrUcture for MUlti-Layer cloUd Services , 2013 .
[21] Wolfgang Kröger,et al. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools , 2008, Reliab. Eng. Syst. Saf..
[22] Alan Dearle,et al. Autonomic Management of Maintenance Scheduling in Chord , 2010, ArXiv.
[23] John D. Moteff,et al. Critical Infrastructures: What Makes an Infrastructure Critical? , 2003 .