A Cloud Forensic Readiness Model for Service Level Agreements Management

14th European Conference on Cyber Warfare and Security (ECCWS-2015), University of Herefordshire, United Kingdom, 2 - 3 July 2015

[1]  Pankesh Patel,et al.  Service Level Agreement in Cloud Computing , 2009 .

[2]  Chris Wren,et al.  Cloud computing: Forensic challenges for law enforcement , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[3]  M. Tahar Kechadi,et al.  Cloud Forensic Readiness: Foundations , 2013, ICDF2C.

[4]  Azer Bestavros,et al.  Formal Verification of SLA Transformations , 2011, 2011 IEEE World Congress on Services.

[5]  Filomena Ferrucci,et al.  Formalization of SLAs for Cloud Forensic Readiness , 2014 .

[6]  M. Tahar Kechadi,et al.  Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results , 2013, Digit. Investig..

[7]  Ian T. Foster,et al.  SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems , 2002, JSSPP.

[8]  Mohammad Reza Meybodi,et al.  Decreasing Impact of SLA Violations:A Proactive Resource Allocation Approachfor Cloud Computing Environments , 2014, IEEE Transactions on Cloud Computing.

[9]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[10]  Flavio De Paoli,et al.  Web Service Contracts: Specification and Matchmaking , 2014, Advanced Web Services.

[11]  Martin Bichler,et al.  Knowledge representation concepts for automated SLA management , 2006, Decis. Support Syst..

[12]  E. S. Pilli,et al.  Cloud Forensics: State-of-the-Art and Research Challenges , 2012, 2012 International Symposium on Cloud and Services Computing.

[13]  Salman Baset,et al.  Cloud SLAs: present and future , 2012, OPSR.

[14]  J. Samuels,et al.  National Institute of Justice , 2000 .

[15]  Soumya K. Ghosh,et al.  An approach to identify and monitor SLA parameters for storage-as-a-service cloud delivery model , 2012, 2012 IEEE Globecom Workshops.

[16]  Ramin Yahyapour,et al.  Service Level Agreements for Cloud Computing , 2011 .

[17]  César A. F. De Rose,et al.  DeSVi : An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures , 2010 .

[18]  Frank Leymann,et al.  Aggregation of Service Level Agreements in the Context of Business Processes , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.

[19]  Pedram Hajipour,et al.  An Appropriate Violation Detection Scenario for Service Level Agreements Based on WS-Agreement Protocol , 2010, J. Convergence Inf. Technol..

[20]  Sebastiaan H. von Solms,et al.  A Multi-component View of Digital Forensics , 2010, 2010 International Conference on Availability, Reliability and Security.

[21]  Mordechai Ben-Ari,et al.  Mathematical Logic for Computer Science , 2012, Springer London.

[22]  Wolfgang Emmerich,et al.  The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.

[23]  Robert Rowlingson,et al.  A Ten Step Process for Forensic Readiness , 2004, Int. J. Digit. EVid..

[24]  Ralph Grishman,et al.  Information Extraction: Techniques and Challenges , 1997, SCIE.

[25]  Denis Reilly,et al.  Cloud Computing: Pros and Cons for Computer Forensic Investigations , 2011 .