Cloud computing

A Sunyaev, A Sunyaev - … computing: Principles of distributed systems and …, 2020 - Springer
Cloud computing is an evolution of information technology and a dominant business model
for delivering IT resources. With cloud computing, individuals and organizations can gain on …

WiP: A novel blockchain-based trust model for cloud identity management

K Bendiab, N Kolokotronis, S Shiaeles… - 2018 IEEE 16th Intl …, 2018 - ieeexplore.ieee.org
Secure and reliable management of identities has become one of the greatest challenges
facing cloud computing today, mainly due to the huge number of new cloud-based …

Toward a unified framework for information systems certification internalization

P Danylak, S Lins, M Greulich… - 2022 IEEE 24th …, 2022 - ieeexplore.ieee.org
Information systems (IS) certifications are often deemed as an effective way to address
contemporary challenges in the IS domain, such as ensuring data protection and making …

Designing monitoring systems for continuous certification of cloud services: Deriving meta-requirements and design guidelines

S Lins, S Schneider, J Szefer, S Ibraheem… - Communications of the …, 2019 - aisel.aisnet.org
Continuous service certification (CSC) involves the consistently gathering and assessing
certification-relevant information about cloud service operations to validate whether they …

Continuous compliance

M Kellogg, M Schäf, S Tasiran, MD Ernst - Proceedings of the 35th IEEE …, 2020 - dl.acm.org
Vendors who wish to provide software or services to large corporations and governments
must often obtain numerous certificates of compliance. Each certificate asserts that the …

Drivers vs. inhibitors-what clinches continuous service certification adoption by cloud service providers?

H Teigeler, S Lins, A Sunyaev - 2018 - scholarspace.manoa.hawaii.edu
Continuous service certification (CSC) is an innovative way to ensure ongoing security and
reliability of cloud services by using (automated) monitoring and auditing techniques. Yet …

[PDF][PDF] Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds.

M Diener, T Bolz - ICISSP, 2023 - scitepress.org
Digitization is on the rise in Europe's public administrations. Since the Covid-19 pandemic
began, public cloud services have become essential in this domain. However, there are still …

Toward evaluating the impact of self-adaptation on security control certification

A Marshall, S Jahan, R Gamble - … of the 13th International Conference on …, 2018 - dl.acm.org
Certifying security controls is required for information systems that are either federally
maintained or maintained by a US government contractor. As described in the NIST SP800 …

Cloud Computing.: Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor Innentäter-Angriffen de lege lata und de lege ferenda.

D Müller - 2020 - torrossa.com
Cloud Computing. Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor
Innentäter-Angriffen de lege lata und de Page 1 Internetrecht und Digitale Gesellschaft Band 22 …

Analysis of Trust aware Web Services using Federated Learning

NH Priya, NG Rani, S Shymalagowri… - … on Intelligent Systems …, 2023 - ieeexplore.ieee.org
The demand of service requesters are truly dynamic as the same way the services provided
by various web service may not meet the need of service requesters and it may be because …