2008
DOI: 10.1007/978-3-540-85485-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring and Reputation Mechanisms for Service Level Agreements

Abstract: Abstract. A Service Level Agreement (SLA) is an electronic contract between a service user and a provider, and specifies the service to be provided, Quality of Service (QoS) properties that must be maintained by a provider during service provision (generally defined as a set of Service Level Objectives (SLOs)), and a set of penalty clauses specifying what happens when service providers fail to deliver the QoS agreed. Although significant work exists on how SLOs may be specified and monitored, not much work has… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(17 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…Rana et al [22] monitor reputation from three points of view: Trusted Third Party, Trusted Module at Service Provider, and Model at Client Site. They introduce the figure of a trusted mediator to solve conflicts between parties.…”
Section: Related Workmentioning
confidence: 99%
“…Rana et al [22] monitor reputation from three points of view: Trusted Third Party, Trusted Module at Service Provider, and Model at Client Site. They introduce the figure of a trusted mediator to solve conflicts between parties.…”
Section: Related Workmentioning
confidence: 99%
“…They discuss penalties or rewards for violating or satisfying an objective. Penalties can be imposed in the form of monetary compensation that is the current case in most public cloud service offerings or by means of reputation track mechanisms (Rana et al, 2008).…”
Section: Regulation Of Penaltiesmentioning
confidence: 99%
“…After an agent owner has negotiated for resources and possibly paid for access, an agent owner expects the security manager to grant access as negotiated. Similar to monitoring of Service Level Agreements (SLA) a trusted third party module can be used to monitor and log the communication between client (agent) and service provider (host) [37].…”
Section: Security Managermentioning
confidence: 99%