SLA-based trust model for secure cloud computing
Cloud computing has changed the strategy used for providing distributed services to many business and government agents. Cloud computing delivers scalable and on-demand services to most users in different domains. However, this new technology has also created many challenges for service providers an...
| Main Author: | Alhamad, Mohammed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
Curtin University
2011
|
| Online Access: | http://hdl.handle.net/20.500.11937/1189 |
Similar Items
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Conceptual SLA Framework for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
A framework for SLA assurance in cloud computing
by: Hammadi, Adil, et al.
Published: (2012)
by: Hammadi, Adil, et al.
Published: (2012)
A hierarchical self-X SLA for cloud computing
by: Mosallanejad, Ahmad, et al.
Published: (2014)
by: Mosallanejad, Ahmad, et al.
Published: (2014)
A hierarchical self-healing SLA for cloud computing
by: Mosallanejad, Ahmad, et al.
Published: (2014)
by: Mosallanejad, Ahmad, et al.
Published: (2014)
A Framework for SLA Management in Cloud Computing for Informed Decision Making
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Ontological services level agreement (SLA) model and its application in cloud computing environment.
by: Abdullah, Rusli
Published: (2013)
by: Abdullah, Rusli
Published: (2013)
SLA violations reduction for web-based education module in cloud computing education ecosystem.
by: Ahmad Mosallanejad,, et al.
Published: (2013)
by: Ahmad Mosallanejad,, et al.
Published: (2013)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Response time for cloud computing providers
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Child Instructed SLA
by: Oliver, Rhonda, et al.
Published: (2017)
by: Oliver, Rhonda, et al.
Published: (2017)
FLA-SLA aware cloud collation formation using fuzzy preference relationship multi-decision approach for federated cloud
by: Vadla, Pradeep Kumar, et al.
Published: (2020)
by: Vadla, Pradeep Kumar, et al.
Published: (2020)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Aligning cloud computing security with business strategy
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
Risk assessment for big data in cloud:security, privacy and trust
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Risk assessment for Big Data in cloud computing: trust as an impact
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
Service Level Agreement (SLA) Assurance for Cloud Services: A Survey from a Transactional Risk Perspective
by: Sun, Le, et al.
Published: (2012)
by: Sun, Le, et al.
Published: (2012)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Corrective feedback in teacher guides and SLA
by: Ellis, Rod
Published: (2013)
by: Ellis, Rod
Published: (2013)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Cloud Security in 21st Century: Current Key Issues in Service Models on Cloud Computing and how to overcome them
by: Sharma, Supern
Published: (2011)
by: Sharma, Supern
Published: (2011)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)
by: Manavi, Sina, et al.
Published: (2012)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Language Teaching Materials as Work Plans: An SLA Perspective
by: Ellis, Rod
Published: (2016)
by: Ellis, Rod
Published: (2016)
Researching Acquisition Sequences: Idealization and De-idealization in SLA
by: Ellis, Rod
Published: (2015)
by: Ellis, Rod
Published: (2015)
Doing meta-analysis in SLA: Practices, choices, and standards
by: Li, S., et al.
Published: (2012)
by: Li, S., et al.
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Similar Items
-
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010) -
Conceptual SLA Framework for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010) -
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011) -
A framework for SLA assurance in cloud computing
by: Hammadi, Adil, et al.
Published: (2012) -
A hierarchical self-X SLA for cloud computing
by: Mosallanejad, Ahmad, et al.
Published: (2014)