State of the art and challenges of security SLA for cloud computing

CAB De Carvalho, RM de Castro Andrade… - Computers & Electrical …, 2017 - Elsevier
There are users and organizations that resist adopting cloud computing solutions, due to
concerns about the security and privacy of their data. A Service Level Agreement (SLA) can …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022 - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

P-STORE: Extension of STORE methodology to elicit privacy requirements

MTJ Ansari, A Baz, H Alhakami, W Alhakami… - Arabian Journal for …, 2021 - Springer
Implementing security and privacy requirements at every level of the software development
cycle is imperative for ensuring optimum usability as well as the users' satisfaction. Software …

Continuous auditing and threat detection in multi-cloud infrastructure

KA Torkura, MIH Sukmana, F Cheng, C Meinel - Computers & Security, 2021 - Elsevier
Efficient change control and configuration management is imperative for addressing the
emerging security threats in cloud infrastructure. These threats majorly exploit …

A semantic big data platform for integrating heterogeneous wearable data in healthcare

E Mezghani, E Exposito, K Drira, M Da Silveira… - Journal of medical …, 2015 - Springer
Advances supported by emerging wearable technologies in healthcare promise patients a
provision of high quality of care. Wearable computing systems represent one of the most …

An empirical study of using planning poker for user story estimation

NC Haugen - AGILE 2006 (AGILE'06), 2006 - ieeexplore.ieee.org
Group estimation of user stories is an important part of extreme programming (XP), used for
both planning releases and iterations. Research has shown that although group estimation …

Cloud-based business process security risk management: a systematic review, taxonomy, and future directions

TE Abioye, OT Arogundade, S Misra, K Adesemowo… - Computers, 2021 - mdpi.com
Despite the attractive benefits of cloud-based business processes, security issues, cloud
attacks, and privacy are some of the challenges that prevent many organizations from using …

Tracing cve vulnerability information to capec attack patterns using natural language processing techniques

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Information, 2021 - mdpi.com
For effective vulnerability management, vulnerability and attack information must be
collected quickly and efficiently. A security knowledge repository can collect such …

Sensor reliability in cyber-physical systems using internet-of-things data: A review and case study

F Castaño, S Strzelczak, A Villalonga, RE Haber… - Remote sensing, 2019 - mdpi.com
Nowadays, reliability of sensors is one of the most important challenges for widespread
application of Internet-of-things data in key emerging fields such as the automotive and …

Security risk assessment framework for cloud computing environments

SH Albakri, B Shanmugam, GN Samy… - Security and …, 2014 - Wiley Online Library
Cloud computing has become today's most common technology buzzword. Despite the
promises of cloud computing to decrease computing implementation costs and deliver …