An approach to security-SLA in cloud computing environment
暂无分享,去创建一个
[1] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[2] G. Lewis,et al. Service Level Agreements in Service-Oriented Architecture Environments , 2008 .
[3] G. Karagiannis,et al. Taxonomy of cloud computing services , 2010, 2010 IEEE Globecom Workshops.
[4] H. D. Rombach,et al. The Goal Question Metric Approach , 1994 .
[5] Martin Gilje Jaatun,et al. Security SLAs - An Idea Whose Time Has Come? , 2012, CD-ARES.
[6] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[7] Schahram Dustdar,et al. Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments , 2010, 2010 International Conference on High Performance Computing & Simulation.
[8] Boyan Bontchev,et al. Design of service level agreements for software services , 2009, CompSysTech '09.
[9] Paulo Lício de Geus,et al. A methodology for management of cloud computing using security criteria , 2012, 2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud).
[10] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[11] Ronda R. Henning,et al. Security service level agreements: quantifiable security for the enterprise? , 1999, NSPW '99.
[12] Fabio Martinelli,et al. Formal approach to security metrics.: what does "more secure" mean for you? , 2010, ECSA '10.