A Cloud Forensic Readiness Model for Service Level Agreements Management
暂无分享,去创建一个
[1] Pankesh Patel,et al. Service Level Agreement in Cloud Computing , 2009 .
[2] Chris Wren,et al. Cloud computing: Forensic challenges for law enforcement , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[3] M. Tahar Kechadi,et al. Cloud Forensic Readiness: Foundations , 2013, ICDF2C.
[4] Azer Bestavros,et al. Formal Verification of SLA Transformations , 2011, 2011 IEEE World Congress on Services.
[5] Filomena Ferrucci,et al. Formalization of SLAs for Cloud Forensic Readiness , 2014 .
[6] M. Tahar Kechadi,et al. Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results , 2013, Digit. Investig..
[7] Ian T. Foster,et al. SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems , 2002, JSSPP.
[8] Mohammad Reza Meybodi,et al. Decreasing Impact of SLA Violations:A Proactive Resource Allocation Approachfor Cloud Computing Environments , 2014, IEEE Transactions on Cloud Computing.
[9] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[10] Flavio De Paoli,et al. Web Service Contracts: Specification and Matchmaking , 2014, Advanced Web Services.
[11] Martin Bichler,et al. Knowledge representation concepts for automated SLA management , 2006, Decis. Support Syst..
[12] E. S. Pilli,et al. Cloud Forensics: State-of-the-Art and Research Challenges , 2012, 2012 International Symposium on Cloud and Services Computing.
[13] Salman Baset,et al. Cloud SLAs: present and future , 2012, OPSR.
[14] J. Samuels,et al. National Institute of Justice , 2000 .
[15] Soumya K. Ghosh,et al. An approach to identify and monitor SLA parameters for storage-as-a-service cloud delivery model , 2012, 2012 IEEE Globecom Workshops.
[16] Ramin Yahyapour,et al. Service Level Agreements for Cloud Computing , 2011 .
[17] César A. F. De Rose,et al. DeSVi : An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures , 2010 .
[18] Frank Leymann,et al. Aggregation of Service Level Agreements in the Context of Business Processes , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.
[19] Pedram Hajipour,et al. An Appropriate Violation Detection Scenario for Service Level Agreements Based on WS-Agreement Protocol , 2010, J. Convergence Inf. Technol..
[20] Sebastiaan H. von Solms,et al. A Multi-component View of Digital Forensics , 2010, 2010 International Conference on Availability, Reliability and Security.
[21] Mordechai Ben-Ari,et al. Mathematical Logic for Computer Science , 2012, Springer London.
[22] Wolfgang Emmerich,et al. The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.
[23] Robert Rowlingson,et al. A Ten Step Process for Forensic Readiness , 2004, Int. J. Digit. EVid..
[24] Ralph Grishman,et al. Information Extraction: Techniques and Challenges , 1997, SCIE.
[25] Denis Reilly,et al. Cloud Computing: Pros and Cons for Computer Forensic Investigations , 2011 .