Proceedings of the 7th International Conference on Security of Information and Networks 2014
DOI: 10.1145/2659651.2659735
|View full text |Cite
|
Sign up to set email alerts
|

Analysing Security requirements in Cloud-based Service Level Agreements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Recent security breaches across the globe have changed this trend and has prompted cloud providers to include security attribute as part of above metrics. Various recent efforts have attempted to specify these security parameters [2], [5]- [7], [15], enabling customers to monitor whether particular security constraints are being met (although this is not always possible to measure, requiring the customer to often rely on the advertised capability from the provider).…”
Section: Introductionmentioning
confidence: 99%
“…Recent security breaches across the globe have changed this trend and has prompted cloud providers to include security attribute as part of above metrics. Various recent efforts have attempted to specify these security parameters [2], [5]- [7], [15], enabling customers to monitor whether particular security constraints are being met (although this is not always possible to measure, requiring the customer to often rely on the advertised capability from the provider).…”
Section: Introductionmentioning
confidence: 99%