mdh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
On incorporating security parameters in service level agreements
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0001-5293-3804
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0003-2018-0996
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0003-3469-1834
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
2019 (English)In: CLOSER 2019 - Proceedings of the 9th International Conference on Cloud Computing and Services Science, SciTePress , 2019, p. 48-57Conference paper, Published paper (Refereed)
Abstract [en]

With development of cloud computing new ways for easy, on-demand, Internet-based access to computing resources have emerged. In such context a Service Level Agreement (SLA) enables contractual agreements between service providers and users. Given an SLA, service users are able to establish trust in that the service outcome corresponds to what they have demanded during the service negotiation process. However, an SLA provides a limited support outside of basic Quality of Service (QoS) parameters, especially when it comes to security. We find security as an important factor to be included in adjusting an SLA according to user defined objectives. Incorporating it in an SLA is challenging due to difficulty to provide complete and quantifiable metrics, thus we propose to focus on a systematic way of addressing security using the security process. In this paper we investigate ways in which security might be incorporated already in the service negotiation process and captured in an SLA. We propose a corresponding process to develop and maintain an SLA that considers both design-, and run-time. To demonstrate the approach we built upon the existing SLAC language and extend its syntax to support security. An example of a service being provided with security guarantees illustrates the concept.

Place, publisher, year, edition, pages
SciTePress , 2019. p. 48-57
Keywords [en]
Cloud computing, Run-time monitoring, Security, Security process, Service level agreement, SLAC, Outsourcing, Contractual agreements, Negotiation process, Quality of Service parameters, Runtime Monitoring, Security parameters, Service Level Agreements, Quality of service
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:mdh:diva-44880DOI: 10.5220/0007658000480057Scopus ID: 2-s2.0-85067500149ISBN: 9789897583650 (print)OAI: oai:DiVA.org:mdh-44880DiVA, id: diva2:1336992
Conference
9th International Conference on Cloud Computing and Services Science, CLOSER 2019, 2 May 2019 through 4 May 2019
Note

Conference code: 148430; Export Date: 11 July 2019; Conference Paper

Available from: 2019-07-11 Created: 2019-07-11 Last updated: 2019-10-15Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Causevic, AidaLisova, ElenaAshjaei, Seyed Mohammad Hossein

Search in DiVA

By author/editor
Causevic, AidaLisova, ElenaAshjaei, Seyed Mohammad HosseinAshgar, Syed Usman
By organisation
Embedded Systems
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 11 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf