Affiliation:
1. University of Innsbruck, Austria
Abstract
Today's increasing trend towards outsourcing IT landscapes and business processes into the Cloud is a double-edged sword. On the one side, companies can save time and money; however, on the other side, moving possible sensitive data and business processes into the Cloud demands for a high degree of information security. In the course of this chapter, the authors give an overview of a Cloud's various vulnerabilities, how to address them properly, and last but not least, a model-driven approach to evaluate the state of security of a Cloud environment by means of negative testing. Besides, the authors incorporate the idea of living models to allow tracking and incorporating of changes in the Cloud environment and react properly and, more important, in time on evolving security requirements throughout the complete Cloud Life Cycle.
Reference44 articles.
1. Introduction to Software Testing
2. Apache. (2011a). Commons SCXML. Retrieved April 21, 2011, from http://commons.apache.org/scxml/
3. Apache. (2011b). Subversion. Retrieved April 21, 2011, from http://subversion.apache.org
4. A brief essay on software testing;A.Bertolino;Software engineering, the development process,2005
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Model-Based Testing as a Service for IoT Platforms;Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications;2016