{"id":"https://openalex.org/W2537266736","doi":"https://doi.org/10.1109/latincom.2014.7041843","title":"An approach to security-SLA in cloud computing environment","display_name":"An approach to security-SLA in cloud computing environment","publication_year":2014,"publication_date":"2014-11-01","ids":{"openalex":"https://openalex.org/W2537266736","doi":"https://doi.org/10.1109/latincom.2014.7041843","mag":"2537266736"},"language":"en","primary_location":{"id":"doi:10.1109/latincom.2014.7041843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/latincom.2014.7041843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Latin-America Conference on Communications (LATINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100659834","display_name":"Carlos Alberto Figueiredo da Silva","orcid":"https://orcid.org/0000-0002-7429-932X"},"institutions":[{"id":"https://openalex.org/I181391015","display_name":"Universidade Estadual de Campinas (UNICAMP)","ror":"https://ror.org/04wffgt70","country_code":"BR","type":"education","lineage":["https://openalex.org/I181391015"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Carlos Alberto da Silva","raw_affiliation_strings":["Institute of Computing - Unicamp Campinas, Brazil"],"affiliations":[{"raw_affiliation_string":"Institute of Computing - Unicamp Campinas, Brazil","institution_ids":["https://openalex.org/I181391015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024273591","display_name":"Paulo L\u00edcio de Geus","orcid":"https://orcid.org/0000-0002-6540-8686"},"institutions":[{"id":"https://openalex.org/I181391015","display_name":"Universidade Estadual de Campinas (UNICAMP)","ror":"https://ror.org/04wffgt70","country_code":"BR","type":"education","lineage":["https://openalex.org/I181391015"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Paulo Licio de Geus","raw_affiliation_strings":["Institute of Computing - Unicamp Campinas, Brazil"],"affiliations":[{"raw_affiliation_string":"Institute of Computing - Unicamp Campinas, Brazil","institution_ids":["https://openalex.org/I181391015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100659834"],"corresponding_institution_ids":["https://openalex.org/I181391015"],"apc_list":null,"apc_paid":null,"fwci":3.9445,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94495338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"23","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.8000816106796265},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7718814611434937},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7371622323989868},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.6744940876960754},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6494622230529785},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6122533082962036},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5723969340324402},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.5522294044494629},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5356212854385376},{"id":"https://openalex.org/keywords/service-level-agreement","display_name":"Service-level agreement","score":0.5261461138725281},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.466182678937912},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.4197271764278412},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.35376912355422974},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2551116347312927},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11926722526550293}],"concepts":[{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.8000816106796265},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7718814611434937},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7371622323989868},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.6744940876960754},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6494622230529785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6122533082962036},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5723969340324402},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.5522294044494629},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5356212854385376},{"id":"https://openalex.org/C2778160497","wikidata":"https://www.wikidata.org/wiki/Q869830","display_name":"Service-level agreement","level":3,"score":0.5261461138725281},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.466182678937912},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.4197271764278412},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.35376912355422974},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2551116347312927},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11926722526550293},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/latincom.2014.7041843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/latincom.2014.7041843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Latin-America Conference on Communications (LATINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321091","display_name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","ror":"https://ror.org/00x0ma614"},{"id":"https://openalex.org/F4320323354","display_name":"Funda\u00e7\u00e3o de Apoio ao Desenvolvimento do Ensino, Ci\u00eancia e Tecnologia do Estado de Mato Grosso do Sul","ror":"https://ror.org/05jtrt935"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W61998585","https://openalex.org/W68204213","https://openalex.org/W320829365","https://openalex.org/W1137093233","https://openalex.org/W1587715758","https://openalex.org/W2030481825","https://openalex.org/W2040222607","https://openalex.org/W2084365948","https://openalex.org/W2097575613","https://openalex.org/W2109026747","https://openalex.org/W2110329234","https://openalex.org/W2122385484","https://openalex.org/W2133769187","https://openalex.org/W2154158105","https://openalex.org/W2209768828","https://openalex.org/W6658168504"],"related_works":["https://openalex.org/W2173238669","https://openalex.org/W2418642600","https://openalex.org/W833563683","https://openalex.org/W2894900144","https://openalex.org/W2979370664","https://openalex.org/W2058696832","https://openalex.org/W2133046623","https://openalex.org/W2495112857","https://openalex.org/W2165572034","https://openalex.org/W3194389583"],"abstract_inverted_index":{"The":[0],"lack":[1],"of":[2,20,104,112,121],"novel":[3],"security":[4,47,56,84,105],"controls":[5,62],"for":[6,75,87],"the":[7,12,18,64,102,110,119,135],"cloud":[8,55,88],"might":[9,95],"arise":[10],"from":[11,63],"fact":[13],"that":[14,52,92],"Cloud":[15],"Computing":[16],"is":[17],"convergence":[19],"many":[21],"different":[22,98],"technological":[23],"areas,":[24],"including":[25],"Utility":[26],"Computer,":[27],"Computational":[28],"Grid,":[29],"Autonomous":[30],"Computing,":[31],"Virtualization":[32],"and":[33,83],"Service":[34,123],"Oriented":[35],"Architectures.":[36],"These":[37],"underlying":[38],"areas":[39],"have":[40],"been":[41],"independently":[42],"addressed":[43],"by":[44,133],"existing":[45],"general-purpose":[46,66],"controls,":[48,106],"but":[49,79],"we":[50],"noticed":[51,71],"each":[53],"current":[54],"control":[57,67],"was":[58],"mapped":[59],"to":[60,108],"multiple":[61],"existing,":[65],"frameworks.":[68],"We":[69,90],"also":[70,80],"a":[72,97],"great":[73],"demand":[74],"not":[76],"only":[77],"patterns":[78],"specification,":[81],"monitoring":[82],"management":[85],"mechanisms":[86],"environments.":[89],"reason":[91],"this":[93],"scenario":[94],"require":[96],"approach,":[99],"one":[100],"where":[101],"specification":[103],"geared":[107],"meet":[109],"needs":[111],"services":[113],"users,":[114],"may":[115,129],"be":[116,131],"achieved":[117],"through":[118],"use":[120],"Security":[122,128],"Level":[124],"Agreement":[125],"-":[126],"Security-SLA.":[127,136],"then":[130],"improved":[132],"automating":[134]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
