Towards Accountable Services in the Cloud
Today, it is highly attractive for businesses to use the cloud as the platform to run their enterprise IT and business transactions: scalable infrastructures provide flexibility and cost efficiency, while the participation in service ecosystems allows building applications on demand by exploiting the vast amount of functionality that is ready to be consumed over the cloud. But taking advantage of all these opportunities is still obstructed by trust concerns. Handing over sensitive data to a third-party for processing, together with the complexity of the service ecosystem, the lack of visibility of its structures and the increased dependency on service providers constitute a non-negligible risk for businesses.
Unable to display preview. Download preview PDF.
- 1.Allam, D., Bourdier, T., Douence, R., Grall, H., Royer, J.C., Südholt, M., de Oliveira, A.S.: Language definition and aspect supportcextension of the service model for security and aspects. Deliverable D1.3, The CESSA project (May 2011), http://cessa.gforge.inria.fr/lib/exe/fetch.php?media=publications:d1-3.pdf
- 2.Idrees, M.S., Serme, G., Roudier, Y., de Oliveira, A.S., Grall, H., Südholt, M.: Evolving Security Requirements in Multi-layered Service-Oriented-Architectures. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 190–205. Springer, Heidelberg (2012)CrossRefGoogle Scholar
- 3.Mejia, I., Südholt, M.: Structured and flexible gray-box composition using invasive distributed patterns. International Journal on Computer Science and Information Systems 6, 13 (2011) ISBN = ISSN: 1646-3692Google Scholar
- 4.Yu, P., Sendor, J., Serme, G., de Oliveira, A.S.: Automating privacy enforcement in cloud platforms. In: Pietro, R.D., Herranz, J. (eds.) 7th International Workshop on Data Privacy Management. Springer (2012)Google Scholar