Automatically enforcing security slas in the cloud

V Casola, A De Benedictis, M Eraşcu… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Dealing with the provisioning of cloud services granted by Security SLAs is a very
challenging research topic. At the state of the art, the main related issues involve:(i) …

A moving target defense approach for protecting resource-constrained distributed devices

V Casola, A De Benedictis… - 2013 IEEE 14th …, 2013 - ieeexplore.ieee.org
Techniques aimed at continuously changing a system's attack surface, usually referred to as
Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks …

Security issues in cloud computing

P Sharma, SK Sood, S Kaur - … on High Performance Architecture and Grid …, 2011 - Springer
The cloud is next generation platform that provides dynamic resource pooling, virtualization
and high resource availability. It is one of today's most enticing technology areas due to its …

A moving target defense mechanism for manets based on identity virtualization

M Albanese, A De Benedictis… - 2013 IEEE Conference …, 2013 - ieeexplore.ieee.org
Mechanisms for continuously changing or shifting a system's attack surface are emerging as
game-changers in cyber security. In this paper, we propose a novel defense mechanism for …

Byod-insure: A security assessment model for enterprise byod

MM Ratchford, Y Wang - 2019 Fifth Conference on Mobile and …, 2019 - ieeexplore.ieee.org
As organizations continue allowing employees to use their personal mobile devices to
access the organizations' networks and the corporate data, a phenomenon calledBring Your …

Novel efficient techniques for real-time cloud security assessment

J Modic, R Trapero, A Taha, J Luna, M Stopar… - Computers & Security, 2016 - Elsevier
Cloud computing offers multiple benefits to users by offloading them of the tasks of setting up
complex infrastructure and costly services. However, these benefits come with a price …

The CloudGrid approach: Security analysis and performance evaluation

V Casola, A Cuomo, M Rak, U Villano - Future Generation Computer …, 2013 - Elsevier
Both cloud and grid are computing paradigms that manage large sets of distributed
resources, and the scientific community would benefit from their convergence. This paper …

A multi-layer moving target defense approach for protecting resource-constrained distributed devices

V Casola, A De Benedictis, M Albanese - Integration of Reusable Systems, 2014 - Springer
Techniques aimed at continuously changing a system's attack surface, usually referred to as
Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks …

On the adoption of security SLAs in the cloud

V Casola, A De Benedictis, M Rak - … and Security in the Cloud: First …, 2015 - Springer
Can security be provided as-a-Service? Is it possible to cover a security service by a proper
Service Level Agreement? This paper tries to reply to these questions by presenting some …

BYOD: a security policy evaluation model

MM Ratchford - … -New Generations: 14th International Conference on …, 2018 - Springer
The rapid increase of personal mobile devices (mainly smartphones and tablets) accessing
corporate data has created a phenomenon commonly known as Bring Your Own Device …