In this paper we present a monitoring architecture that is automatically configured and activated based on a signed Security SLA. Such monitoring architecture integrates different security-related monitoring tools (either developed ad-hoc or already available as open-source or commercial products) to collect measurements related to specific metrics associated with the set of security Service Level Objectives (SLOs) that have been specified in the Security SLA. To demonstrate our approach, we discuss a case study related to detection and management of vulnerabilities and illustrate the integration of the popular open source monitoring system Open VAS into our monitoring architecture. We show how the system is configured and activated by mean...
International audienceToday, organizations and individuals are moving from proprietary servers to th...
International audienceThe issue of data security and privacy in multi-cloud based environments requi...
In an IaaS cloud the physical infrastructure is controlled by service providers, includingits securi...
In this paper we present a monitoring architecture that is automatically configured and activated ba...
Cloud security, due to the lack of control over leased resources, is considered one of the main inhi...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
Dealing with the provisioning of cloud services granted by Security SLAs is a very challenging resea...
International audienceCloud computing enabled service-level agreements (SLAs) to gain widespread use...
International audienceIn public cloud, the service provider will be in charge of monitoring the phys...
Cloud computing is in current demand and widely used for businesses because of its scalability and f...
Large amounts of business-critical data are transferred, processed and stored in cloud services, rai...
Cloud computing has become a popular paradigm for implementing scalable computing infrastructures pr...
International audienceMigrating to the cloud results in losing full control of the physical infrastr...
© Springer International Publishing Switzerland 2014. Maintaining trust in cloud computing is a sign...
International audienceOne of the risks of moving to a public cloud is losing full control of the inf...
International audienceToday, organizations and individuals are moving from proprietary servers to th...
International audienceThe issue of data security and privacy in multi-cloud based environments requi...
In an IaaS cloud the physical infrastructure is controlled by service providers, includingits securi...
In this paper we present a monitoring architecture that is automatically configured and activated ba...
Cloud security, due to the lack of control over leased resources, is considered one of the main inhi...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
Dealing with the provisioning of cloud services granted by Security SLAs is a very challenging resea...
International audienceCloud computing enabled service-level agreements (SLAs) to gain widespread use...
International audienceIn public cloud, the service provider will be in charge of monitoring the phys...
Cloud computing is in current demand and widely used for businesses because of its scalability and f...
Large amounts of business-critical data are transferred, processed and stored in cloud services, rai...
Cloud computing has become a popular paradigm for implementing scalable computing infrastructures pr...
International audienceMigrating to the cloud results in losing full control of the physical infrastr...
© Springer International Publishing Switzerland 2014. Maintaining trust in cloud computing is a sign...
International audienceOne of the risks of moving to a public cloud is losing full control of the inf...
International audienceToday, organizations and individuals are moving from proprietary servers to th...
International audienceThe issue of data security and privacy in multi-cloud based environments requi...
In an IaaS cloud the physical infrastructure is controlled by service providers, includingits securi...