ACKNOWLEDGEMENTS
This work is supported by the Serendipity project
funded by SSF, the SAFSEC-CPS project funded by
The Knowledge Foundation, the FiC project funded
by SSF, and within the context of the XPRES frame-
work.
REFERENCES
Aceto, G., Botta, A., de Donato, W., and Pescap
`
e, A.
(2013). Cloud monitoring: A survey. Computer Net-
works, 57(9):2093 – 2115.
Amazon Web Services (2006). Inc. amazon cloudwatch.
http://aws.amazon.com/cloudwatch.
Broy, M., Kr
¨
uger, I. H., and Meisinger, M. (2007). A formal
model of services. ACM Trans. Softw. Eng. Methodol.
Casola, V., Benedictis, A. D., Modic, J., Rak, M., and Vil-
lano, U. (2016a). Per-service security sla: A new
model for security management in clouds. In IEEE
25th International Conference on Enabling Technolo-
gies: Infrastructure for Collaborative Enterprises,
pages 83–88.
Casola, V., d. Benedictis, A., Eras¸cu, M., Rak, M., and
Villano, U. (2016b). A security sla-driven method-
ology to set-up security capabilities on top of cloud
services. In 2016 10th International Conference on
Complex, Intelligent, and Software Intensive Systems,
pages 549–554.
Cloud Security Alliance (2013). Cloud control matrix v3.0.
da Silva, C. A. and de Geus, P. L. (2014). An approach to
security-sla in cloud computing environment. In IEEE
Latin-America Conference on Communications, pages
1–6.
Emeakaroha, V. C., Ferreto, T. C., Netto, M. A. S., Brandic,
I., and Rose, C. A. F. D. (2012a). Casvid: Application
level monitoring for sla violation detection in clouds.
In 2012 IEEE 36th Annual Computer Software and
Applications Conference, pages 499–508.
Emeakaroha, V. C., Netto, M. A., Calheiros, R. N., Brandic,
I., Buyya, R., and Rose, C. A. D. (2012b). To-
wards autonomic detection of sla violations in cloud
infrastructures. Future Generation Computer Systems,
28(7):1017 – 1029. Special section: Quality of Ser-
vice in Grid and Cloud Computing.
Google (2008). Inc. google app engine. https://developers.
google.com/appengine/.
Hyperic (2008). Cloud status. http://www.hyperic.com/
products/cloud-status-monitoring.
ISO (2015). ISO/IEC 27017: Information technology – Se-
curity techniques – Code of practice for information
security controls based on ISO/IEC 27002 for cloud
services.
ISO/IEC 27002 (2013). Information technology, security
techniques, code of practice for information security
management. International Organization for Stan-
dardization.
Jaatun, M. G., Bernsmed, K., and Undheim, A. (2012). Se-
curity slas – an idea whose time has come? In Quirch-
mayr, G., Basl, J., You, I., Xu, L., and Weippl, E.,
editors, Multidisciplinary Research and Practice for
Information Systems, pages 123–130, Berlin, Heidel-
berg. Springer Berlin Heidelberg.
Kaaniche, N., Mohamed, M., Laurent, M., and Ludwig, H.
(2017). Security SLA Based Monitoring in Clouds. In
2017 IEEE International Conference on Edge Com-
puting, pages 90–97.
Keller, A. and Ludwig, H. (2003). The wsla framework:
Specifying and monitoring service level agreements
for web services. Journal of Network and Systems
Management, 11(1):57–81.
Kissel, R. (2013). Glossary of key information security
terms, Revision 2. U.S. Dept. of Commerce, National
Institute of Standards and Technology.
Kizza, J. M. (2017). Security Assessment, Analysis, and
Assurance. Springer.
Kouki, Y. and Ledoux, T. (2012). CSLA : a Language
for improving Cloud SLA Management. In Interna-
tional Conference on Cloud Computing and Services
Science.
Kyriazis, E. D. (2013). Cloud computing service level
agreements - exploitation of research results. Euro-
pean Commission Directorate General Communica-
tions Networks, Content and Technology Unit E2 –
Software and Services, Cloud.
Lopes, I. M., Pereira, J. P., and Oliveira, P. (2017). Def-
inition of information systems security policies. In
Rocha,
´
A., Correia, A. M., Adeli, H., Reis, L. P.,
and Costanzo, S., editors, Recent Advances in In-
formation Systems and Technologies, pages 225–234,
Cham. Springer International Publishing.
Luna Garcia, J., Langenberg, R., and Suri, N. (2012).
Benchmarking cloud security level agreements using
quantitative policy trees. In Proceedings of the ACM
Workshop on Cloud Computing Security Workshop,
pages 103–112, New York, NY, USA. ACM.
Maarouf, A., Marzouk, A., and Haqiq, A. (2015). A review
of sla specification languages in the cloud computing.
In 10th International Conference on Intelligent Sys-
tems: Theories and Applications.
McDaniel, P. (2005). Policy, pages 461–464. Springer US,
Boston, MA.
Mell, P., Scarfone, K., and Romanosky, S. (2006). Common
vulnerability scoring system. IEEE Security Privacy,
4(6):85–89.
Microsoft Corporation (2010). Microsoft azure. http:
//www.windowsazure.com.
Miede, A., Nedyalkov, N., Gottron, C., K
¨
onig, A., Repp, N.,
and Steinmetz, R. (2010). A Generic Metamodel for
IT Security Attack Modeling for Distributed Systems.
In International Conference on Availability, Reliabil-
ity and Security.
Mu
˜
noz, A., Gonzalez, J., and Ma
˜
na, A. (2012). A
performance-oriented monitoring system for security
properties in cloud computing applications. Comput.
J., 55(8):979–994.
CLOSER 2019 - 9th International Conference on Cloud Computing and Services Science
56