D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services and resources. Even if the benefits in terms of performance, maintenance, and cost are …
B Cook - … Aided Verification: 30th International Conference, CAV …, 2018 - Springer
We report on the development and use of formal verification tools within Amazon Web Services (AWS) to increase the security assurance of its cloud infrastructure and to help …
M Saleem, MR Warsi, S Islam - Journal of Information Security and …, 2023 - Elsevier
Trust is an essential security component and plays a crucial role in building secure information processing systems. Many organizations have adopted zero-trust principles in …
Quality-of-service and SLA guarantees are among the major challenges of cloud-based services. In this paper we first present a new cloud model called SLAaaS—SLA aware …
In recent years, cloud computing has gained popularity, and it is now used to support various areas of human life. Cloud forensics has been introduced to help forensic …
Cloud computing is the most promising current implementation of utility computing in the business world, because it provides some key features over classic utility computing, such …
Large Scale and Big Data: Processing and Management provides readers with a central source of reference on the data management techniques currently available for large-scale …
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the provider to secure applications and data. Cloud providers do not offer the ability to create …
M Kazim, L Liu, SY Zhu - IEEE Access, 2018 - ieeexplore.ieee.org
IoT devices have complex requirements but their limitations in terms of storage, network, computing, data analytics, scalability, and big data management require it to be used it with …