Issues characterizing cloud computing such as security, interoperability, and vendor lock-in are likely to act as inhibitors of the widespread adoption of cloud computing in organizations. These issues call for relational and contractual mechanisms to articulate the desired outcomes of service provisioning and acceptable behavior of service recipients and providers. In this paper we focus on the contractual mechanisms for this purpose and, more specifically, Service Level Agreements (SLA). We have conducted a qualitative study interviewing industry experts to understand the extent to which SLA specifications in traditional IT services outsourcing can be applied in cloud computing, identifying elements becoming redundant or not applicable, a...
One of slogans of cloud computing is to pay only what you use, but it is necessary that the ...
Cloud computing that provides cheap and pay-as-you-go computing resources is rapidly gaining momentu...
Abstract — The paper highlights existing research voids in defining and designing binding and enforc...
Issues characterizing cloud computing such as security, interoperability, and vendor lock-in are lik...
Cloud computing security, interoperability, and vendor lock-in are likely to act as inhibitors of th...
Part 13: Services IIIInternational audienceCloud computing security, interoperability, and vendor lo...
Cloud computing has change the strategy of the way of providing distributed services for many busine...
Abstract--Most of the organizations are running their applications in cloud due to reliability, scal...
The need of mechanisms to automate and regulate the interaction amongst the parties involved in the ...
This contribution provides the insights of the author as a practitioner related to the salient point...
Cloud computing has been a hot topic in the research community since 2007. In cloud computing the on...
Abstract — Cloud computing that provides cheap and pay-as-you-go computing resources is rapidly gain...
International audienceThere are users and organizations that resist adopting cloud computing solutio...
Cloud computing has matured to become a valuable on demand alternative to traditional ownership mode...
This document is an extension of the Practical Guide to Cloud Computing white paper that was deliver...
One of slogans of cloud computing is to pay only what you use, but it is necessary that the ...
Cloud computing that provides cheap and pay-as-you-go computing resources is rapidly gaining momentu...
Abstract — The paper highlights existing research voids in defining and designing binding and enforc...
Issues characterizing cloud computing such as security, interoperability, and vendor lock-in are lik...
Cloud computing security, interoperability, and vendor lock-in are likely to act as inhibitors of th...
Part 13: Services IIIInternational audienceCloud computing security, interoperability, and vendor lo...
Cloud computing has change the strategy of the way of providing distributed services for many busine...
Abstract--Most of the organizations are running their applications in cloud due to reliability, scal...
The need of mechanisms to automate and regulate the interaction amongst the parties involved in the ...
This contribution provides the insights of the author as a practitioner related to the salient point...
Cloud computing has been a hot topic in the research community since 2007. In cloud computing the on...
Abstract — Cloud computing that provides cheap and pay-as-you-go computing resources is rapidly gain...
International audienceThere are users and organizations that resist adopting cloud computing solutio...
Cloud computing has matured to become a valuable on demand alternative to traditional ownership mode...
This document is an extension of the Practical Guide to Cloud Computing white paper that was deliver...
One of slogans of cloud computing is to pay only what you use, but it is necessary that the ...
Cloud computing that provides cheap and pay-as-you-go computing resources is rapidly gaining momentu...
Abstract — The paper highlights existing research voids in defining and designing binding and enforc...