Search

Your search keyword '"Casola, Valentina"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Casola, Valentina" Remove constraint Author: "Casola, Valentina" Topic cloud computing security Remove constraint Topic: cloud computing security
27 results on '"Casola, Valentina"'

Search Results

1. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services

2. Per-service security SLAs for cloud security management: Model and implementation

3. Security SLA in Next Generation Data Centers, the SPECS Approach

4. Automatically Enforcing Security SLAs in the Cloud

5. Towards Model-Based Security Assessment of Cloud Applications

6. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications

7. Per-service security sla: A new model for security management in clouds

8. SLA-based secure cloud application development

9. Providing security SLA in next generation Data Centers with SPECS: The EMC case study

10. Healthcare-Related Data in the Cloud: Challenges and Opportunities

11. SLA-Based Secure Cloud Application Development: The SPECS Framework

12. Cloud Security: From Per-Provider to Per-Service Security SLAs

13. Security Monitoring in the Cloud: An SLA-Based Approach

14. On the adoption of security SLAs in the cloud

15. DoS Protection in the Cloud through the SPECS Services

16. Developing Secure Cloud Applications

17. A Cloud Application for Security Service Level Agreement Evaluation

18. Developing Secure Cloud Applications: A Case Study

19. Security as a Service Using an SLA-Based Approach via SPECS

20. An SLA-based approach to manage sensor networks as-a-service

21. Security and Performance Trade-off in PerfCloud

22. SeNsIM-SEC: security in heterogeneous sensor networks

23. Identity Federation in Cloud Computing

24. Preliminary design of a platform-as-a-service to provide security in cloud

25. MUSA Deployer: Deployment of Multi-cloud Applications

26. An automatic tool for benchmark testing of cloud applications

27. Methodology to Obtain the Security Controls in Multi-cloud Applications

Catalog

Books, media, physical & digital resources