Security Requirements of E-Business Processes
I3E '01 Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E-Business, E-Government
Security Conscious Web Service Composition
ICWS '06 Proceedings of the IEEE International Conference on Web Services
Security Requirements Engineering: A Framework for Representation and Analysis
IEEE Transactions on Software Engineering
Security Prospects through Cloud Computing by Adopting Multiple Clouds
CLOUD '11 Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing
A Multi-Level Security Model for PartitioningWorkflows over Federated Clouds
CLOUDCOM '11 Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science
A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing
CLOUDCOM '11 Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science
A test-based security certification scheme for web services
ACM Transactions on the Web (TWEB)
Partitioning and Cloud Deployment of Composite Web Services under Security Constraints
IC2E '13 Proceedings of the 2013 IEEE International Conference on Cloud Engineering
Cloud computing automation: integrating USDL and TOSCA
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Hi-index | 0.00 |
It is recognized that the most important obstacle to the development of the cloud is the variety of new security threats which requests new methods and mechanisms. This is even truer for those who want to deploy business processes, because of the critical knowledge they encapsulate in terms of know-how and data. This paper proposes an approach combining modeling techniques and cloud selection for a trusted deployment of a security risk-aware business process in security constrained clouds.