Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level eval...
Cloud computing is a greatest and latest thing. Marketers for lots of big companies are all using cl...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Cloud computing is a collective, optimized usage of IT resources which can be accessed from anywhere...
IEEE CloudCom 2014Data with high security requirements is being processed and stored with increasing...
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is a signi...
The technologic shift from an internal centralized system repository to the cloud demands organizati...
In this paper we describe the structure and functionality of a certification integrated framework ai...
Due to a lack of transparency in cloud based services well-defined security levels cannot be assured...
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is signifi...
What controls should be used to ensure adequate security level during operation is a non-trivial sub...
Achieving transparency and security awareness in cloud environments is a challenging task. It is eve...
Cloud computing offers a model where resources (storage, applications, etc.) are abstracted and prov...
AbstractRecent trends within the IT industry have led to a tectonic shift in the way organizations u...
The cloud computing paradigm has become a mainstream solution for the deployment of business process...
Cloud Computing is the rising generation key platform for sharing the resources like software as a s...
Cloud computing is a greatest and latest thing. Marketers for lots of big companies are all using cl...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Cloud computing is a collective, optimized usage of IT resources which can be accessed from anywhere...
IEEE CloudCom 2014Data with high security requirements is being processed and stored with increasing...
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is a signi...
The technologic shift from an internal centralized system repository to the cloud demands organizati...
In this paper we describe the structure and functionality of a certification integrated framework ai...
Due to a lack of transparency in cloud based services well-defined security levels cannot be assured...
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is signifi...
What controls should be used to ensure adequate security level during operation is a non-trivial sub...
Achieving transparency and security awareness in cloud environments is a challenging task. It is eve...
Cloud computing offers a model where resources (storage, applications, etc.) are abstracted and prov...
AbstractRecent trends within the IT industry have led to a tectonic shift in the way organizations u...
The cloud computing paradigm has become a mainstream solution for the deployment of business process...
Cloud Computing is the rising generation key platform for sharing the resources like software as a s...
Cloud computing is a greatest and latest thing. Marketers for lots of big companies are all using cl...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Cloud computing is a collective, optimized usage of IT resources which can be accessed from anywhere...