{"id":"https://openalex.org/W2976474791","doi":"https://doi.org/10.1109/infcomw.2019.8845105","title":"Cloud Security Service Level Agreements: Representation and Measurement","display_name":"Cloud Security Service Level Agreements: Representation and Measurement","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2976474791","doi":"https://doi.org/10.1109/infcomw.2019.8845105","mag":"2976474791"},"language":"en","primary_location":{"id":"doi:10.1109/infcomw.2019.8845105","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2019.8845105","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028480555","display_name":"Neminath Hubballi","orcid":"https://orcid.org/0000-0001-9669-9773"},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Neminath Hubballi","raw_affiliation_strings":["Discipline of Computer Science and Engineering, Indian Institute of Technology Indore"],"affiliations":[{"raw_affiliation_string":"Discipline of Computer Science and Engineering, Indian Institute of Technology Indore","institution_ids":["https://openalex.org/I64295750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086548988","display_name":"Amey Kiran Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amey Kiran Patel","raw_affiliation_strings":["Discipline of Computer Science and Engineering, Indian Institute of Technology Indore"],"affiliations":[{"raw_affiliation_string":"Discipline of Computer Science and Engineering, Indian Institute of Technology Indore","institution_ids":["https://openalex.org/I64295750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110293433","display_name":"Amit Kumar Meena","orcid":null},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit Kumar Meena","raw_affiliation_strings":["Discipline of Computer Science and Engineering, Indian Institute of Technology Indore"],"affiliations":[{"raw_affiliation_string":"Discipline of Computer Science and Engineering, Indian Institute of Technology Indore","institution_ids":["https://openalex.org/I64295750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031486539","display_name":"Nikhil Tripathi","orcid":"https://orcid.org/0000-0001-8944-8044"},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nikhil Tripathi","raw_affiliation_strings":["Discipline of Computer Science and Engineering, Indian Institute of Technology Indore"],"affiliations":[{"raw_affiliation_string":"Discipline of Computer Science and Engineering, Indian Institute of Technology Indore","institution_ids":["https://openalex.org/I64295750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028480555"],"corresponding_institution_ids":["https://openalex.org/I64295750"],"apc_list":null,"apc_paid":null,"fwci":0.3392,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68733823,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"145","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7948764562606812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7631634473800659},{"id":"https://openalex.org/keywords/service-level","display_name":"Service level","score":0.71796715259552},{"id":"https://openalex.org/keywords/service-level-agreement","display_name":"Service-level agreement","score":0.6741426587104797},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.5532141923904419},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5291540622711182},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5239912867546082},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.4128507673740387},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18731942772865295},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11763307452201843},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11457547545433044}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7948764562606812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7631634473800659},{"id":"https://openalex.org/C181889124","wikidata":"https://www.wikidata.org/wiki/Q380204","display_name":"Service level","level":2,"score":0.71796715259552},{"id":"https://openalex.org/C2778160497","wikidata":"https://www.wikidata.org/wiki/Q869830","display_name":"Service-level agreement","level":3,"score":0.6741426587104797},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.5532141923904419},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5291540622711182},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5239912867546082},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.4128507673740387},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18731942772865295},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11763307452201843},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11457547545433044},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infcomw.2019.8845105","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2019.8845105","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W184462372","https://openalex.org/W2014143000","https://openalex.org/W2030481825","https://openalex.org/W2083563943","https://openalex.org/W2220237777","https://openalex.org/W2293184711","https://openalex.org/W2331614211","https://openalex.org/W2407127642","https://openalex.org/W2517419853","https://openalex.org/W2569726726","https://openalex.org/W2798945281","https://openalex.org/W6750805967"],"related_works":["https://openalex.org/W1505516830","https://openalex.org/W4293586492","https://openalex.org/W4308050728","https://openalex.org/W1580216079","https://openalex.org/W4241940037","https://openalex.org/W2174749613","https://openalex.org/W2141338028","https://openalex.org/W2151841150","https://openalex.org/W2785347425","https://openalex.org/W1481152834"],"abstract_inverted_index":{"Service":[0],"Level":[1],"Agreements":[2],"(SLAs)":[3],"are":[4,26,35],"commonly":[5,27],"used":[6,28],"to":[7,29,82],"negotiate":[8,30],"the":[9,54,107,112,146],"computation":[10],"and":[11,18,41,74,86,119,138,144],"performance":[12,31],"requirements":[13],"between":[14],"a":[15,80,87,96,115,135],"service":[16],"provider":[17],"user.":[19],"In":[20,49],"commercial":[21],"cloud":[22,47,61,113,116,136],"computing":[23,62],"environments,":[24],"SLAs":[25,45,59,67,85,94,130],"guarantees.":[32],"However":[33],"there":[34],"no":[36],"standardized":[37],"mechanisms":[38],"for":[39,89],"defining":[40,57],"enforcement":[42],"of":[43,56,92,109,131],"security":[44,58,73,147],"in":[46,60,106,134],"computing.":[48],"this":[50],"paper,":[51],"we":[52],"consider":[53],"problem":[55],"environment.":[63],"We":[64,78,126],"divide":[65],"these":[66,93],"into":[68],"three":[69],"categories":[70],"as":[71],"availability,":[72],"integrity":[75],"related":[76],"SLAs.":[77],"provide":[79],"mechanism":[81],"formally":[83],"describe":[84],"method":[88],"run-time":[90],"evaluation":[91],"through":[95],"trusted":[97],"Third":[98],"Party":[99],"Auditor":[100],"(TPA).":[101],"TPA":[102,141],"collects":[103],"necessary":[104],"evidence":[105],"form":[108],"logs":[110],"from":[111],"on":[114],"user's":[117],"behalf":[118],"evaluates":[120],"SLA's":[121],"compliance":[122],"against":[123],"collected":[124],"evidence.":[125],"implement":[127],"few":[128],"sample":[129],"each":[132],"category":[133],"testbed":[137],"show":[139],"that":[140],"can":[142],"evaluate":[143],"enforce":[145],"requirements.":[148]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
