REFERENCES
Aceto, G., Botta, A., de Donato, W., and Pescap
`
e, A.
(2013). Cloud monitoring: A survey. Computer Net-
works, 57(9):2093 – 2115.
Alcaraz Calero, J. M. and Aguado, J. G. (2015). Monpaas:
An adaptive monitoring platformas a service for cloud
computing infrastructures and services. IEEE TSC,
8(1):65–78.
Alshalan, A., Pisharody, S., and Huang, D. (2016). A
survey of mobile vpn technologies. IEEE COMST,
18(2):1177–1196.
Anisetti, M., Ardagna, C., Damiani, E., and Gaudenzi, F.
(2016). A certification framework for cloud-based ser-
vices. In Proc. of ACM SAC, Pisa, Italy.
Anisetti, M., Ardagna, C., Damiani, E., and Gaudenzi, F.
(2017). A semi-automatic and trustworthy scheme for
continuous cloud service certification. IEEE TSC.
Anisetti, M., Ardagna, C., Damiani, E., Ioini, N. E., and
Gaudenzi, F. (2018). Modeling time, probability, and
configuration constraints for continuous cloud service
certification. Computers & Security, 72:234 – 254.
Ardagna, C., Asal, R., Damiani, E., and Vu, Q. (2015).
From security to assurance in the cloud: A survey.
ACM CSUR, 48(1):2:1–2:50.
Baldini, G., Skarmeta, A., Fourneret, E., Neisse, R., Leg-
eard, B., and Le Gall, F. (2016). Security certification
and labelling in internet of things. In 2016 IEEE 3rd
World Forum on Internet of Things (WF-IoT).
Cheah, M., Shaikh, S. A., Bryans, J., and Wooderson, P.
(2018). Building an automotive security assurance
case using systematic security evaluations. COSE,
77:360 – 379.
Ciuffoletti, A. (2016). Application level interface for a
cloud monitoring service. CS&I, 46:15 – 22.
De Chaves, S. A., Uriarte, R. B., and Westphall, C. B.
(2011). Toward an architecture for monitoring private
clouds. IEEE Comm. Mag., 49(12):130–137.
Elsayed, M. and Zulkernine, M. (2018). Towards security
monitoring for cloud analytic applications. In Proc. of
IEEE BigDataSecurity/HPSC/IDS 2018, Omaha, NE,
USA.
Greenberg, M. S., Byington, J. C., and Harper, D. G.
(1998). Mobile agents and security. IEEE Comm.
Mag., 36(7):76–85.
Herrmann, D. (2002). Using the Common Criteria for IT
security evaluation. Auerbach Publications.
Jahan, S., Marshall, A., and Gamble, R. (2018). Self-
adaptation strategies to maintain security assurance
cases. In Proc. of IEEE SASO 2018, Trento, Italy.
Jahan, S., Pasco, M., Gamble, R., McKinley, P., and Cheng,
B. (2019). Mape-sac: A framework to dynamically
manage security assurance cases. In Proc. of IEEE
FAS*W 2019.
Ouedraogo, M., Mouratidis, H., Khadraoui, D., and Dubois,
E. (2010). An agent-based system to support assur-
ance of security requirements. In Proc. of SSIRI 2010,
Singapore.
Povedano-Molina, J., Lopez-Vega, J. M., Lopez-Soler,
J. M., Corradi, A., and Foschini, L. (2013). Dargos: A
highly adaptable and scalable monitoring architecture
for multi-tenant clouds. FGCS, 29(8):2041–2056.
Saltzer, J. H. and Schroeder, M. D. (1975). The protection
of information in computer systems. Proceedings of
the IEEE, 63(9):1278–1308.
Taherizadeh, S., Jones, A. C., Taylor, I., Zhao, Z., and
Stankovski, V. (2018). Monitoring self-adaptive appli-
cations within edge computing frameworks: A state-
of-the-art review. JSS, 136:19 – 38.
Teigeler, H., Lins, S., and Sunyaev, A. (2017). Chicken
and egg problem: What drives cloud service providers
and certification authorities to adopt continuous ser-
vice certification? In Proc. of WISP 2017, Seoul,
South Korea.
West, R. (2008). The psychology of security. Commun.
ACM, 51(4):34–40.
Wu, C. and Marotta, S. (2013). Framework for assess-
ing cloud trustworthiness. In Proc. of IEEE CLOUD
2013, Santa Clara, CA, USA.
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems
109