Home > Research > Publications & Outputs > Security as a service using an SLA-based approa...

Links

Text available via DOI:

View graph of relations

Security as a service using an SLA-based approach via SPECS

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Security as a service using an SLA-based approach via SPECS. / Rak, M.; Suri, Neeraj; Luna, J. et al.
2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, 2013. p. 1-6.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Rak, M, Suri, N, Luna, J, Petcu, D, Casola, V & Villano, U 2013, Security as a service using an SLA-based approach via SPECS. in 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, pp. 1-6. https://doi.org/10.1109/CloudCom.2013.165

APA

Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V., & Villano, U. (2013). Security as a service using an SLA-based approach via SPECS. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (pp. 1-6). IEEE. https://doi.org/10.1109/CloudCom.2013.165

Vancouver

Rak M, Suri N, Luna J, Petcu D, Casola V, Villano U. Security as a service using an SLA-based approach via SPECS. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE. 2013. p. 1-6 doi: 10.1109/CloudCom.2013.165

Author

Rak, M. ; Suri, Neeraj ; Luna, J. et al. / Security as a service using an SLA-based approach via SPECS. 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, 2013. pp. 1-6

Bibtex

@inproceedings{134baa30f6b340b68b8bb97079a39e84,
title = "Security as a service using an SLA-based approach via SPECS",
abstract = "The cloud offers attractive options to migrate corporate applications, without any implication for the corporate security manager to manage or to secure physical resources. While this ease of migration is appealing, several security issues arise: can the validity of corporate legal compliance regulations still be ensured for remote data storage? How is it possible to assess the Cloud Service Provider (CSP) ability to meet corporate security requirements? Can one monitor and enforce the agreed cloud security levels? Unfortunately, no comprehensive solutions exist for these issues. In this context, we introduce a new approach, named SPECS. It aims to offer mechanisms to specify cloud security requirements and to assess the security features offered by CSPs, and to integrate the desired security services (e.g., credential and access management) into cloud services with a Security-as-a-Service approach. Furthermore, SPECS intends to provide systematic approaches to negotiate, to monitor and to enforce the security parameters specified in Service Level Agreements (SLA), to develop and to deploy security services that are cloud SLA-aware and are implemented as an open-source Platform-as-a-Service (PaaS). This paper introduces the main concepts of SPECS. {\textcopyright} 2013 IEEE.",
keywords = "Cloud Computing, Cloud Security, Security-as-a-Service, Service Level Agreements, Cloud computing, Distributed database systems, Security systems, Cloud securities, Cloud service providers, Physical resources, Security as a services, Security features, Security parameters, Security requirements, Laws and legislation",
author = "M. Rak and Neeraj Suri and J. Luna and D. Petcu and V. Casola and U. Villano",
year = "2013",
month = dec,
day = "2",
doi = "10.1109/CloudCom.2013.165",
language = "English",
pages = "1--6",
booktitle = "2013 IEEE 5th International Conference on Cloud Computing Technology and Science",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Security as a service using an SLA-based approach via SPECS

AU - Rak, M.

AU - Suri, Neeraj

AU - Luna, J.

AU - Petcu, D.

AU - Casola, V.

AU - Villano, U.

PY - 2013/12/2

Y1 - 2013/12/2

N2 - The cloud offers attractive options to migrate corporate applications, without any implication for the corporate security manager to manage or to secure physical resources. While this ease of migration is appealing, several security issues arise: can the validity of corporate legal compliance regulations still be ensured for remote data storage? How is it possible to assess the Cloud Service Provider (CSP) ability to meet corporate security requirements? Can one monitor and enforce the agreed cloud security levels? Unfortunately, no comprehensive solutions exist for these issues. In this context, we introduce a new approach, named SPECS. It aims to offer mechanisms to specify cloud security requirements and to assess the security features offered by CSPs, and to integrate the desired security services (e.g., credential and access management) into cloud services with a Security-as-a-Service approach. Furthermore, SPECS intends to provide systematic approaches to negotiate, to monitor and to enforce the security parameters specified in Service Level Agreements (SLA), to develop and to deploy security services that are cloud SLA-aware and are implemented as an open-source Platform-as-a-Service (PaaS). This paper introduces the main concepts of SPECS. © 2013 IEEE.

AB - The cloud offers attractive options to migrate corporate applications, without any implication for the corporate security manager to manage or to secure physical resources. While this ease of migration is appealing, several security issues arise: can the validity of corporate legal compliance regulations still be ensured for remote data storage? How is it possible to assess the Cloud Service Provider (CSP) ability to meet corporate security requirements? Can one monitor and enforce the agreed cloud security levels? Unfortunately, no comprehensive solutions exist for these issues. In this context, we introduce a new approach, named SPECS. It aims to offer mechanisms to specify cloud security requirements and to assess the security features offered by CSPs, and to integrate the desired security services (e.g., credential and access management) into cloud services with a Security-as-a-Service approach. Furthermore, SPECS intends to provide systematic approaches to negotiate, to monitor and to enforce the security parameters specified in Service Level Agreements (SLA), to develop and to deploy security services that are cloud SLA-aware and are implemented as an open-source Platform-as-a-Service (PaaS). This paper introduces the main concepts of SPECS. © 2013 IEEE.

KW - Cloud Computing

KW - Cloud Security

KW - Security-as-a-Service

KW - Service Level Agreements

KW - Cloud computing

KW - Distributed database systems

KW - Security systems

KW - Cloud securities

KW - Cloud service providers

KW - Physical resources

KW - Security as a services

KW - Security features

KW - Security parameters

KW - Security requirements

KW - Laws and legislation

U2 - 10.1109/CloudCom.2013.165

DO - 10.1109/CloudCom.2013.165

M3 - Conference contribution/Paper

SP - 1

EP - 6

BT - 2013 IEEE 5th International Conference on Cloud Computing Technology and Science

PB - IEEE

ER -