Filters








20 Hits in 3.8 sec

Security SLA Based Monitoring in Clouds

Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig
2017 2017 IEEE International Conference on Edge Computing (EDGE)  
Challenges to Security Monitoring in Clouds While the definition of a cloud SLA monitoring system in a cloud context is difficult due to the increasing dynamism of application environments and the heterogeneity  ...  Moreover, the specification of security SLAs should be backed-up with the right monitoring and enforcement mechanisms that address cloud environments' dynamic nature.  ... 
doi:10.1109/ieee.edge.2017.20 dblp:conf/edge/KaanicheMLL17 fatcat:iym7tfei3bhfxfltdnlvotpls4

SLA Compliance Checking and System Runtime Reconfiguration — A Model Based Approach

Mahin Abbasipour, Electrical and Computer Engineering, Concordia University, Montreal, Canada., Ferhat Khendek, Maria Toeroe
2019 Journal of Software  
Service providers aim at optimizing system resource utilization while ensuring the quality of service expressed in the Service Level Agreements (SLAs) is met.  ...  In this paper, we propose a model-driven framework, which manages the compliance of SLAs and enables dynamic reconfiguration. We use UML models to describe all the artifacts in the framework.  ...  In [9] and [10] , authors propose the rSLA framework to monitor SLAs during their life cycle. The framework consists of three main components: rSLA language, rSLA Service and Xlets.  ... 
doi:10.17706/jsw.14.11.488-518 fatcat:42n7v44iovg4vdz34de6odzxjy

Trust management system for Opportunistic Cloud Services

Eric Kuada
2013 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet)  
The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure as a Service, and Software as a Service, usage scenarios.  ...  OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services.  ...  Table 4 shows a pseudo SLA template for SaaS. 2) rSLA created from sSLA or pSLA A service user may accept this sSLA in order to use the service or request for additional requirements in its rSLA.  ... 
doi:10.1109/cloudnet.2013.6710555 dblp:conf/cloudnet/Kuada13 fatcat:fuaf3pgxcjbwdp3ueoljfjqoji

Enforcing Service Level Agreements Using an Economically Enhanced Resource Manager [chapter]

Mario Macías, Garry Smith, Omer Rana, Jordi Guitart, Jordi Torres
2009 Economic Models and Algorithms for Distributed Systems  
In particular, this paper describes techniques used by the EERM to support revenue maximisation across multiple Service Level Agreements.  ...  An overriding factor in Grid markets is the need to ensure that desired Quality of Service levels meet the expectations of market participants.  ...  Thanks are also due to Martijn Warnier and Thomas Quillinan of Vrije University, Amsterdam, The Netherlands -for discussions about types of violations that could arise in SLAs.  ... 
doi:10.1007/978-3-7643-8899-7_7 fatcat:w636apgo7zf2deibaivgwehtj4

Dynamic Advance Reservation for Grid System Using Resource Pools [chapter]

Zhiang Wu, Jie Cao, Youquan Wang
2011 Lecture Notes in Computer Science  
Dynamic behavior of resources is a non-negligible feature in grid system, and most research efforts on advance reservation cannot effectively deal with the negative effect resulted from the dynamic feature  ...  Secondly, Quality of Service (QoS) distance computation method for hybrid variable types is presented.  ...  Three different types of SLAs are included in SNAP. They are task service level agreements (TSLAs), resource service level agreements (RSLAs) and binding service level agreements (BSLAs).  ... 
doi:10.1007/978-3-642-24403-2_10 fatcat:6mcnceni3fam7pqyvgyvquz5aa

SLA definition for network intrusion detection systems in IaaS clouds

Amir Teshome Wonjiga, Louis Rilling, Christine Morin
2021 ACM Symposium on Applied Computing  
In this paper, we propose a method allowing CSPs to define SLAs providing each tenant with guarantees about the performance of a security monitoring probe, specifically a Network Intrusion Detection System  ...  Moreover, security monitoring services should be configured according to the tenant's specific requirements.  ...  SLAs include: • Service Description: The security monitoring service is used to monitor existing vulnerabilities in a product.  ... 
doi:10.1145/3412841.3441885 dblp:conf/sac/WonjigaRM21 fatcat:zgqifq7c4zeu7l4h7dzw75wfa4

Classification and Characterization of Core Grid Protocols for Global Grid Computing [article]

Harshad B. Prajapati, Vipul K. Dabhi
2013 arXiv   pre-print
Grid protocols play major role in implementing services that facilitate coordinated resource sharing across diverse organizations.  ...  In this paper, we provide comprehensive coverage of different core Grid protocols that can be used in Global Grid Computing.  ...  TSLA characterizes a task in terms of its service steps and resource requirements. • RSLA [60] : It is an SLA associated with acquiring a resource.  ... 
arXiv:1302.5481v1 fatcat:e6jao5446fer7faovr65tkmdeq

Analysis and Provision of QoS for Distributed Grid Applications

Rashid J. Al-Ali, Kaizar Amin, Gregor von Laszewski, Omer F. Rana, David W. Walker, Mihael Hategan, Nestor Zaluzec
2004 Journal of Grid Computing  
Some of these applications operate in a collaborative mode, requiring data to be stored and delivered in a timely manner.  ...  This class of applications must adhere to stringent real-time constraints and Quality-of-Service (QoS) requirements.  ...  of SLAs: Task SLA (TSLA), Resource SLA (RSLA) and Bind SLA (BSLA).  ... 
doi:10.1007/s10723-004-6743-8 fatcat:sbmwf2qibbcb7ffk5ufxtk6m3y

Towards Multi-cloud SLO Evaluation

Kyriakos Kritikos, Chrysostomos Zeginis, Andreas Paravoliasis, Dimitris Plexousakis
2018 Proceedings of the 8th International Conference on Cloud Computing and Services Science  
A modern service-based application (SBA) operates in a cross-cloud, highly dynamic environment while comprises various components at different abstraction levels that might fail.  ...  While most research focuses on SBA monitoring, SLO evaluation is usually restricted in a centralised, single-cloud form, not amenable to heavy workloads that could incur in a complex SBA system.  ...  ., 2015) proposes the rSLA SLA language and management service. rSLA has been validated using IaaS-related SLOs.  ... 
doi:10.5220/0006684604090417 dblp:conf/closer/KritikosZPP18 fatcat:akfyucmenveqtnpsuba5rovctm

Semantic-enabled CARE Resource Broker (SeCRB) for managing grid and cloud environment

Thamarai Selvi Somasundaram, Kannan Govindarajan, Usha Kiruthika, Rajkumar Buyya
2014 Journal of Supercomputing  
Integrating emerging virtualization technologies in grid and cloud computing facilitates the provision of dynamic virtual resources in the required execution environment.  ...  However, conventional grid resources sometimes fail to offer a dynamic application execution environment and this increases the rate at which the job requests of users are rejected.  ...  [44] classified SLA into three categories namely Resource SLAs (RSLA), Task SLAs (TSLA) and Binding SLAs (BSLA).  ... 
doi:10.1007/s11227-013-1047-z fatcat:dopcbntzdbeblcis57axrrfxfe

Federated IaaS Resource Brokerage [chapter]

Bruno Veloso, Fernando Meireles, Benedita Malheiro, Juan Carlos Burguillo
Advances in Systems Analysis, Software Engineering, and High Performance Computing  
and resource SLA -rSLA -between a consumer and a provider.  ...  In particular, the platform contemplates the establishment of brokerage SLA -bSLA -between the platform and each provider or consumer, coalition SLA -cSLA -between the members of a coalition of providers  ...  communicated by an external SLA monitoring and enforcement module.  ... 
doi:10.4018/978-1-5225-0153-4.ch009 fatcat:5llsp3kjkjdgjemoqpjofpdhje

Systematic Service Level Agreement (SLA) data management

Aikaterini Stamou, Jean-Henry Morin
2014
The authors refer to the service execution environment as a Web-services-on-demand environment that is comprised of the following characteristics: • dynamic outsourcing • SLA life cycle management • dynamic  ...  the RSLA.  ... 
doi:10.13097/archive-ouverte/unige:40738 fatcat:mmfocsoynnfxpl4v4zrbif6kte

Grid Application Performance Prediction: a Case Study in BROADEN

Karim Djemame, Mohammed H Haji
2007 unpublished
In this paper a SNAP-base (Service Negotiation Acquisition Protocol) resource broker is extended to include a QoS (Quality of Service) Manager which utilises a run-time historical database that allows  ...  One of the key elements in BROADEN is the ability to predict XTO applications run-time.  ...  Acknowledgements The work reported in this paper was developed and undertaken as part of the BROADEN (Business Resource Optimization for Aftermarket and Design on Engineering Networks) project.  ... 
doi:10.14236/ewic/vecos2007.15 fatcat:2o5p7rbwrjagjiwzepwln2pss4

Monitoring serverless applications : an SLO-based approach [article]

Raoul Ghit, Universität Stuttgart
2022
This should be the case even if the monitored application is made up of different serverless components, such as Function-as-a-Service components, or even deployed across different environments.  ...  The possibilities for monitoring such cloud applications, are for the most part restricted to the cloud monitoring services provided by the cloud service providers, thus, the approaches to monitoring are  ...  Similar to CSLA, a team of IBM researchers under the lead of Ludwig who developed the rSLA approach, wanted their SLA language to be suitable for heterogeneous and dynamic cloud environments [LSM+15,  ... 
doi:10.18419/opus-12084 fatcat:ripv6aszb5atzndejdnwcfcnzi

Enhanced SLA management in the high performance computing domain [article]

Bastian Koller, Universität Stuttgart, Universität Stuttgart
2011
In dieser Arbeit werden ein Schema für die Repräsentierung von Service Level Agreements (Dienstgütevereinbarungen), sowie eine zugehörige Architektur zum SLA Management präsentiert.  ...  This thesis describes a Service Level Agreement Schema for the High Performance Computing domain and the according architecture to allow for SLA Management, which are both developed on base of three different  ...  This means to execute the service and to monitor it to allow for an assessment The SLA Evaluator in the provider domain evaluates the monitored data with respect to the parameters in the SLA and logs  ... 
doi:10.18419/opus-6352 fatcat:dmlsfsadmbewljlsy3p7nywaza
« Previous Showing results 1 — 15 out of 20 results