SLA-based cloud security monitoring: Challenges, barriers, models and methods

9Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Despite the tremendous efforts in cloud computing to overcome its main adoption barriers, like security concerns or quality of service guarantees, there is currently no commercial product or research prototype of a SLA-based cloud security monitoring system. This paper investigates the main challenges and barriers in designing a SLA-based cloud security monitoring system and the models and methods that can be used in its development.

Cite

CITATION STYLE

APA

Petcu, D. (2014). SLA-based cloud security monitoring: Challenges, barriers, models and methods. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8805, pp. 359–370). Springer Verlag. https://doi.org/10.1007/978-3-319-14325-5_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free