Companies want to benefit from the numerous advantages of cloud services such as flexibility and cost efficiency. However, cloud services vary considerably with respect to the security and privacy mechanisms provided. Moreover, security-aware companies complain the lack of transparency concerning the security measures and processes the cloud provider has installed. As a solution for the latter one, auditors may evaluate cloud providers and issue certificates attesting whether the cloud provider meets the agreed requirements. However, due to the characteristics of cloud computing, on-site inspections in the data centers of a cloud provider do not seem to be realistic. In this paper we show how metrics can be derived from data protection requ...
Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere ...
Today large amounts of security and privacy-critical data are transferred, processed and stored in e...
Large amounts of business-critical data are transferred, processed and stored in cloud services, rai...
Cloud services promise numerous advantages for companies over traditional in-house data processing i...
The use of cloud computing services is an attractive opportunity for companies to improve IT Service...
An automatically controlled and analyzed privacy level in cloud environments would probably help to ...
Many organizations are adopting cloud services to reduce their computing cost and increase the flexi...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
INST: L_042Companies who desire to use cloud computing hesitate to share their data as they doubt se...
Abstract Cloud computing provides enormous business opportunities, but at the same time is a complex...
Cloud computing is redefining the on-demand usage of remotely-located, and highly available computin...
Cloud computing offers a model where resources (storage, applications, etc.) are abstracted and prov...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Operational security assurance evaluation requires building security metrics models to express the e...
© 2019 IEEE. Cloud services have become popular as an effective form to outsource computational reso...
Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere ...
Today large amounts of security and privacy-critical data are transferred, processed and stored in e...
Large amounts of business-critical data are transferred, processed and stored in cloud services, rai...
Cloud services promise numerous advantages for companies over traditional in-house data processing i...
The use of cloud computing services is an attractive opportunity for companies to improve IT Service...
An automatically controlled and analyzed privacy level in cloud environments would probably help to ...
Many organizations are adopting cloud services to reduce their computing cost and increase the flexi...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
INST: L_042Companies who desire to use cloud computing hesitate to share their data as they doubt se...
Abstract Cloud computing provides enormous business opportunities, but at the same time is a complex...
Cloud computing is redefining the on-demand usage of remotely-located, and highly available computin...
Cloud computing offers a model where resources (storage, applications, etc.) are abstracted and prov...
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteri...
Operational security assurance evaluation requires building security metrics models to express the e...
© 2019 IEEE. Cloud services have become popular as an effective form to outsource computational reso...
Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere ...
Today large amounts of security and privacy-critical data are transferred, processed and stored in e...
Large amounts of business-critical data are transferred, processed and stored in cloud services, rai...