Secure monitoring of service level agreements

KP Clark, ME Warnier, FMT Brazier… - … Reliability and Security, 2010 - ieeexplore.ieee.org
Service Level Agreements (SLA) are commonly used to define terms and conditions of
service provisioning. WS-Agreement is an SLA specification that addresses the need of both …

Negotiation and monitoring of service level agreements

TB Quillinan, KP Clark, M Warnier, FMT Brazier… - Grids and Service …, 2010 - Springer
Abstract Service level agreements (SLAs) provide a means to define specific Quality of
Service (QoS) guarantees between providers and consumers of services. Negotiation and …

Reactive monitoring of service level agreements

D Khader, J Padget, M Warnier - Grids and Service-Oriented Architectures …, 2010 - Springer
Abstract Service Level Agreements require a monitoring system that checks that no party
violates the agreement. Current monitoring techniques either have a high performance …

[PDF][PDF] Detecting advanced persistent threats through deception techniques

N Virvilis-Kollitiris - Ph. D. dissertation, Information Security and …, 2015 - infosec.aueb.gr
The number and complexity of cyber-attacks has been increasing steadily in recent years.
The major players in today's cyber conflicts are well organized and heavily funded teams …

A novel mechanism for provisioning of high-level quality of service information in grid environments

K Tserpes, D Kyriazis, A Menychtas… - European Journal of …, 2008 - Elsevier
Grids, like other heterogeneous systems, have reached the level of maturity where they are
addressing the Quality of Service (QoS) provision aspect as a fundamental part of their …

A generic Grid security policy reconciliation framework

L Gymnopoulos, V Tsoumas, I Soupionis… - Internet …, 2005 - emerald.com
Purpose–The purpose of this paper is to provide a framework for enhancing security policy
management in the Grid. Design/methodology/approach–The Grid security policy …

NFU-Enabled FASTA: moving bioinformatics applications onto wide area networks

EJ Baker, GN Lin, H Liu, R Kosuri - Source Code for Biology and Medicine, 2007 - Springer
Abstract Background Advances in Internet technologies have allowed life science
researchers to reach beyond the lab-centric research paradigm to create distributed …

Enhancing Security Policy Negotiation In The Grid

L Gymnopoulos, V Tsoumas, I Soupionis… - Prooceeding of The …, 2005 - books.google.com
The Grid is a major step towards achieving coordinated resource sharing and problem
solving within and among virtual organizations. Grid's decentralized nature along with the …

A trust infrastructure for Grid security module

L Zhen, L Zhishu, C Biao - 2010 3rd International Conference …, 2010 - ieeexplore.ieee.org
During the procedure of resource discovery in Grid, a requester (consumer) may be offered
several resources (providers) which identities have been verified to submit his task. How to …

[PDF][PDF] Fighting an unfair battle: Unconventional defences against sophisticated threats

N Virvilis - 2015 - infosec.aueb.gr
□“Forget anything you know about current defensive technologies and state-of-the-art
security solutions. We have them all, and we know that are not effective against our threat …