A systematic review of cloud modeling languages

A Bergmayr, U Breitenbücher, N Ferry… - ACM Computing …, 2018 - dl.acm.org
Modern cloud computing environments support a relatively high degree of automation in
service provisioning, which allows cloud service customers (CSCs) to dynamically acquire …

A taxonomy and survey of cloud resource orchestration techniques

D Weerasiri, MC Barukh, B Benatallah… - ACM Computing …, 2017 - dl.acm.org
Cloud services and applications prove indispensable amid today's modern utility-based
computing. The cloud has displayed a disruptive and growing impact on everyday …

Combining declarative and imperative cloud application provisioning based on TOSCA

U Breitenbücher, T Binz, K Képes… - … conference on cloud …, 2014 - ieeexplore.ieee.org
The automation of application provisioning is one of the most important issues in Cloud
Computing. The Topology and Orchestration Specification for Cloud Applications (TOSCA) …

Standards-based DevOps automation and integration using TOSCA

J Wettinger, U Breitenbücher… - 2014 IEEE/ACM 7th …, 2014 - ieeexplore.ieee.org
DevOps is an emerging paradigm to tightly integrate developers with operations personnel.
This is required to enable fast and frequent releases in the sense of continuously delivering …

Software-defined infrastructure and the SAVI testbed

JM Kang, T Lin, H Bannazadeh… - Testbeds and Research …, 2014 - Springer
In this paper we consider Software-Defined Infrastructure (SDI), a new concept for integrated
control and management of converged heterogeneous resources. SDI enables …

Towards mitigation of low and slow application ddos attacks

M Shtern, R Sandel, M Litoiu, C Bachalo… - … conference on cloud …, 2014 - ieeexplore.ieee.org
Distributed Denial of Service attacks are a growing threat to organizations and, as defense
mechanisms are becoming more advanced, hackers are aiming at the application layer. For …

Security-by-design in multi-cloud applications: An optimization approach

V Casola, A De Benedictis, M Rak, U Villano - Information Sciences, 2018 - Elsevier
Currently an increasing number of customers require cloud services with guaranteed
security levels. At this aim, the adoption of multi-cloud strategies is spreading in a large …

Attack surface modeling and assessment for penetration testing of IoT system designs

Y Mahmoodi, S Reiter, A Viehl… - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
Security by Design becomes a significant aspect for establishing the Internet-of-Things (IoT)
paradigm. In this paper, we present an approach to utilize virtual prototypes (VP) at system …

(wip) cloudcamp: Automating the deployment and management of cloud services

A Bhattacharjee, Y Barve, A Gokhale… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
Users of cloud platforms often must expend significant manual efforts in the deployment and
orchestration of their services on cloud platforms due primarily to having to deal with the …

A model-driven approach to automate the deployment and management of cloud services

A Bhattacharjee, Y Barve, A Gokhale… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Although many provisioning tools are available for deployment and management of
composite cloud services to overcome the manual efforts that are tedious and error-prone …