In an IaaS cloud the physical infrastructure is controlled by service providers, includingits security monitoring aspect. Clients hosting their information system need to trust and rely onwhat the providers claim. At the same time providers try to give assurance for some aspects of theinfrastructure (e.g. availability) through service level agreements (SLAs). We aim at extendingSLAs to include security monitoring terms. In this paper we describe the challenges to reach thisgoal, we propose a three-steps incremental strategy and we apply the first step of this strategyon the case of network IDS (NIDS) monitoring probes. In this case study we select a relevantmetric to describe the performance of an NIDS, that is the metric can figure in an S...
Given that the information and the physical worlds are merging, threats to integrity, confidentiali...
Cloud computing offers a model where resources (storage, applications, etc.) are abstracted and prov...
A multitude of issues affect the broader adoption of Cloud computing, with the perceived lack of tru...
In an IaaS cloud the physical infrastructure is controlled by service providers,including its securi...
International audienceMigrating to the cloud results in losing full control of the physical infrastr...
The cloud computing business model introduced a new paradigm in terms of ownership of a system. Befo...
International audienceIn public cloud, the service provider will be in charge of monitoring the phys...
In an IaaS cloud the physical infrastructure is controlled by service providers, includingits securi...
Cloud security, due to the lack of control over leased resources, is considered one of the main inhi...
© Springer International Publishing Switzerland 2014. Maintaining trust in cloud computing is a sign...
In this paper we present a monitoring architecture that is automatically configured and activated ba...
International audienceOne of the risks of moving to a public cloud is losing full control of the inf...
International audienceCloud computing enabled service-level agreements (SLAs) to gain widespread use...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
Cloud network is rapidly growing due to massive increase in interconnected devices and the emergence...
Given that the information and the physical worlds are merging, threats to integrity, confidentiali...
Cloud computing offers a model where resources (storage, applications, etc.) are abstracted and prov...
A multitude of issues affect the broader adoption of Cloud computing, with the perceived lack of tru...
In an IaaS cloud the physical infrastructure is controlled by service providers,including its securi...
International audienceMigrating to the cloud results in losing full control of the physical infrastr...
The cloud computing business model introduced a new paradigm in terms of ownership of a system. Befo...
International audienceIn public cloud, the service provider will be in charge of monitoring the phys...
In an IaaS cloud the physical infrastructure is controlled by service providers, includingits securi...
Cloud security, due to the lack of control over leased resources, is considered one of the main inhi...
© Springer International Publishing Switzerland 2014. Maintaining trust in cloud computing is a sign...
In this paper we present a monitoring architecture that is automatically configured and activated ba...
International audienceOne of the risks of moving to a public cloud is losing full control of the inf...
International audienceCloud computing enabled service-level agreements (SLAs) to gain widespread use...
Cloud monitoring and, above all, security monitoring, is of fundamental importance for both provider...
Cloud network is rapidly growing due to massive increase in interconnected devices and the emergence...
Given that the information and the physical worlds are merging, threats to integrity, confidentiali...
Cloud computing offers a model where resources (storage, applications, etc.) are abstracted and prov...
A multitude of issues affect the broader adoption of Cloud computing, with the perceived lack of tru...