Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Valentina CasolaAlessandra De BenedictisMassimiliano RakErkuden RiosPublished in: Cloud Forward (2016)
Keyphrases
- cloud computing
- security issues
- security requirements
- cloud storage
- security mechanisms
- security level
- security measures
- security protocols
- security management
- information security
- security properties
- security analysis
- security services
- functional requirements
- key management
- data encryption
- security architecture
- data integrity
- security patterns
- design methodology
- security policies
- design process
- identity management
- cryptographic protocols
- intrusion detection
- access control
- data security
- encryption scheme
- key exchange
- key agreement protocol
- key exchange protocol
- rfid systems
- electronic voting
- authentication mechanism
- key establishment
- digital signature scheme
- digital rights management
- diffie hellman
- security model
- authentication protocol
- smart card
- network security
- stream cipher
- mobile agent system
- key distribution
- software architecture
- key agreement