Tailored Security: Building Nonrepudiable Security Service-Level Agreements
نویسندگان
چکیده
منابع مشابه
Optimising Security Configurations with Service Level Agreements
Security and data integrity are important aspects in the fields of Grid and cluster computing. However, security usually incurs a certain amount of performance degradation and adds usage complexity to a field of computing where performance is crucial and usage complexity is already high. The growing popularity of Grid computing is leading to vastly different security requirements. While some Gr...
متن کاملSecurity and Compliance Ontology for Cloud Service Agreements
Cloud computing is a business paradigm where two important roles must be defined: provider and consumer. Providers offer services (e.g. web application, web services, and databases) and consumers pay for using them. The goal of this research is to focus on security and compliance aspects of cloud service. An ontology is introduced, which is the conceptualization of cloud domain, for analyzing d...
متن کاملQuantitative Assessment of Cloud Security Level Agreements - A Case Study
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteria such as the offered service level agreements (SLA) and costs, and also recently based on security aspects (i.e., due to regulatory compliance). Unfortunately, it is quite uncommon for a CSP to specify the security levels associated with their services, hence impeding users from making security ...
متن کاملOn the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
Abstract A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer. In the paper, we review the security of some nonrepudiable threshold proxy signature schemes with known signers. We show that Sun’s threshold proxy...
متن کاملEvaluation of a Security Service Level Agreement
Data breaches are the most serious security breaks among all types of cybersecurity threats. While Cloud hosting services provide assurances against data loss, understanding the security service level agreements (SSLAs) and privacy policies offered by the service providers empowers consumers to assess risks and costs associated with migrating their information technology (IT) operations to the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Vehicular Technology Magazine
سال: 2013
ISSN: 1556-6072
DOI: 10.1109/mvt.2013.2269188