共 50 条
- [31] Inclusion of Security Requirements in SLA Lifecycle Management for Cloud Computing [J]. 2015 IEEE 2ND WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2015, : 7 - 12
- [32] System Management to Comply with SLA Availability Guarantees in Cloud Computing [J]. 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
- [35] SLA Based Utility Analysis for Improving QoS in Cloud Computing [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 3, INDIA 2016, 2016, 435 : 573 - 581
- [36] Risk Assessment and Classification of Focusing SLA Requirement in Cloud Computing [J]. Pang., Y. (pangpang7117@gmail.com), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
- [37] A Model For The Classification Of Failures Presented In Cloud Computing In Accordance With The Sla [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 1, 2014, : 263 - 267
- [38] Taxonomy of SLA violation minimization techniques in cloud computing. [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1845 - 1850
- [39] Resource Management Mechanism for SLA Provisioning on Cloud Computing for IoT [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 500 - 502
- [40] Agent-based SLA negotiation protocol for cloud computing [J]. 2017 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2017, : 33 - 37