{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:57Z","timestamp":1750221237380,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3268966.3268975","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"48-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications"],"prefix":"10.1145","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[{"name":"University of Naples Federico II, Naples, Italy"}]},{"given":"Alessandra","family":"De Benedictis","sequence":"additional","affiliation":[{"name":"University of Naples Federico II, Naples, Italy"}]},{"given":"Massimiliano","family":"Rak","sequence":"additional","affiliation":[{"name":"University of Campania Luigi Vanvitelli, Aversa, Italy"}]},{"given":"Umberto","family":"Villano","sequence":"additional","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"H. Alavizadeh D. S. Kim J. B. Hong and J. Jang-Jaccard. 2017. Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). In Information Security Practice and Experience Joseph K. Liu and Pierangela Samarati (Eds.). Springer International Publishing Cham 539--548.  H. Alavizadeh D. S. Kim J. B. Hong and J. Jang-Jaccard. 2017. Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). In Information Security Practice and Experience Joseph K. Liu and Pierangela Samarati (Eds.). Springer International Publishing Cham 539--548.","DOI":"10.1007\/978-3-319-72359-4_32"},{"key":"e_1_3_2_1_2_1","volume-title":"MTD CBITS: Moving Target Defense for Cloud-Based IT Systems. In ESORICS .","author":"Bardas A. G.","year":"2017","unstructured":"A. G. Bardas , S. C. Sundaramurthy , X. Ou , and S. A. DeLoach . 2017 . MTD CBITS: Moving Target Defense for Cloud-Based IT Systems. In ESORICS . A. G. Bardas, S. C. Sundaramurthy, X. Ou, and S. A. DeLoach. 2017. MTD CBITS: Moving Target Defense for Cloud-Based IT Systems. In ESORICS ."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2540630"},{"key":"e_1_3_2_1_4_1","volume-title":"Information Sciences","volume":"455","author":"Casola V.","year":"2018","unstructured":"V. Casola , A. De Benedictis , M. Rak , and U. Villano . 2018. Security-by-design in multi-cloud applications: An optimization approach . Information Sciences , Vol. 454-- 455 ( 2018 ), 344 -- 362. V. Casola, A. De Benedictis, M. Rak, and U. Villano. 2018. Security-by-design in multi-cloud applications: An optimization approach. Information Sciences , Vol. 454--455 (2018), 344 -- 362."},{"key":"e_1_3_2_1_5_1","first-page":"107","article-title":"MUSA Deployer: Deployment of Multi-cloud Applications. In 2017 IEEE 26th International Conference on Enabling Technologies","volume":"00","author":"Casola V.","year":"2017","unstructured":"V. Casola , A. De Benedictis , M. Rak , U. Villano , E. Rios , A. Rego , and G. Capone . 2017 b. MUSA Deployer: Deployment of Multi-cloud Applications. In 2017 IEEE 26th International Conference on Enabling Technologies : Infrastructure for Collaborative Enterprises (WETICE) , Vol. 00. 107 -- 112 . V. Casola, A. De Benedictis, M. Rak, U. Villano, E. Rios, A. Rego, and G. Capone. 2017b. MUSA Deployer: Deployment of Multi-cloud Applications. In 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Vol. 00. 107--112.","journal-title":"Infrastructure for Collaborative Enterprises (WETICE)"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370659.1370660"},{"key":"e_1_3_2_1_7_1","unstructured":"Chef Software Inc. 2018. Chef web site . https:\/\/www.chef.io\/chef\/.  Chef Software Inc. 2018. Chef web site . https:\/\/www.chef.io\/chef\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995274"},{"key":"e_1_3_2_1_9_1","unstructured":"Cloud Security Alliance. 2011a. Consensus Assessment Initiative Questionnaire . https:\/\/cloudsecurityalliance.org\/group\/consensus-assessments\/.  Cloud Security Alliance. 2011a. Consensus Assessment Initiative Questionnaire . https:\/\/cloudsecurityalliance.org\/group\/consensus-assessments\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Cloud Security Alliance. 2011b. Security Trust & Assurance Registry (STAR) . https:\/\/cloudsecurityalliance.org\/star\/.  Cloud Security Alliance. 2011b. Security Trust & Assurance Registry (STAR) . https:\/\/cloudsecurityalliance.org\/star\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Cloud Security Alliance. 2015. Cloud Controls Matrix v3.0. https:\/\/cloudsecurityalliance.org\/download\/cloud-controls-matrix-v3\/  Cloud Security Alliance. 2015. Cloud Controls Matrix v3.0. https:\/\/cloudsecurityalliance.org\/download\/cloud-controls-matrix-v3\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"W. Connell M. Albanese and S. Venkatesan. 2017. A Framework for Moving Target Defense Quantification. In ICT Systems Security and Privacy Protection Sabrina De Capitani di Vimercati and Fabio Martinelli (Eds.). Springer International Publishing Cham 124--138.  W. Connell M. Albanese and S. Venkatesan. 2017. A Framework for Moving Target Defense Quantification. In ICT Systems Security and Privacy Protection Sabrina De Capitani di Vimercati and Fabio Martinelli (Eds.). Springer International Publishing Cham 124--138.","DOI":"10.1007\/978-3-319-58469-0_9"},{"key":"e_1_3_2_1_13_1","unstructured":"Danga Interactive. {n. d.}. The Memcached web site . http:\/\/memcached.org\/.  Danga Interactive. {n. d.}. The Memcached web site . http:\/\/memcached.org\/."},{"volume-title":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS) . 469--474","author":"De Benedictis A.","key":"e_1_3_2_1_14_1","unstructured":"A. De Benedictis , V. Casola , M. Rak , and U. Villano . 2016. Cloud Security: From Per-Provider to Per-Service Security SLAs . In 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS) . 469--474 . A. De Benedictis, V. Casola, M. Rak, and U. Villano. 2016. Cloud Security: From Per-Provider to Per-Service Security SLAs. In 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS) . 469--474."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443790"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.03.009"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"S. Jajodia A. K. Ghosh V. Swarup C. Wang and X. S. Wang. 2011. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats 1st ed.). Springer Publishing Company Incorporated.   S. Jajodia A. K. Ghosh V. Swarup C. Wang and X. S. Wang. 2011. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats 1st ed.). Springer Publishing Company Incorporated.","DOI":"10.1007\/978-1-4614-0977-9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.35"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. K. Manadhata and J. M. Wing. 2011. A Formal Model for a System's Attack Surface .Springer New York New York NY. 1--28 pages.  P. K. Manadhata and J. M. Wing. 2011. A Formal Model for a System's Attack Surface .Springer New York New York NY. 1--28 pages.","DOI":"10.1007\/978-1-4614-0977-9_1"},{"key":"e_1_3_2_1_20_1","unstructured":"MUSA Consortium. 2015. The MUSA project web site. http:\/\/musa-project.eu\/.  MUSA Consortium. 2015. The MUSA project web site. http:\/\/musa-project.eu\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Nginx Inc. 2018. Nginx web site . http:\/\/nginx.org .  Nginx Inc. 2018. Nginx web site . http:\/\/nginx.org ."},{"key":"e_1_3_2_1_23_1","unstructured":"A. Pannetrat G. Hogben S. Katopodis G. Spanoudakis and C.S. Cazorla. 2013. D2.1: Security-aware sla specification language and cloud security dependency model. Technical report Certification infrastrUcture for MUlti-Layer cloUd Services (CUMULUS).  A. Pannetrat G. Hogben S. Katopodis G. Spanoudakis and C.S. Cazorla. 2013. D2.1: Security-aware sla specification language and cloud security dependency model. Technical report Certification infrastrUcture for MUlti-Layer cloUd Services (CUMULUS)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.98"},{"volume-title":"2014 IEEE International Conference on Communications (ICC). 804--809","author":"Peng W.","key":"e_1_3_2_1_25_1","unstructured":"W. Peng , F. Li , C. T. Huang , and X. Zou . 2014. A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces . In 2014 IEEE International Conference on Communications (ICC). 804--809 . W. Peng, F. Li, C. T. Huang, and X. Zou. 2014. A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces. In 2014 IEEE International Conference on Communications (ICC). 804--809."},{"volume-title":"Green, Pervasive, and Cloud Computing, Man Ho Allen Au, Arcangelo Castiglione, Kim-Kwang Raymond Choo, Francesco Palmieri, and Kuan-Ching Li (Eds.)","key":"e_1_3_2_1_26_1","unstructured":"Massimiliano Rak. 2017. Security Assurance of (Multi-)Cloud Application with Security SLA Composition . In Green, Pervasive, and Cloud Computing, Man Ho Allen Au, Arcangelo Castiglione, Kim-Kwang Raymond Choo, Francesco Palmieri, and Kuan-Ching Li (Eds.) . Springer International Publishing , Cham , 786--799. Massimiliano Rak. 2017. Security Assurance of (Multi-)Cloud Application with Security SLA Composition. In Green, Pervasive, and Cloud Computing, Man Ho Allen Au, Arcangelo Castiglione, Kim-Kwang Raymond Choo, Francesco Palmieri, and Kuan-Ching Li (Eds.). Springer International Publishing, Cham, 786--799."},{"key":"e_1_3_2_1_27_1","unstructured":"SPECS Consortium. 2013. The SPECS project web site. http:\/\/specs-project.eu\/.  SPECS Consortium. 2013. The SPECS project web site. http:\/\/specs-project.eu\/."},{"key":"e_1_3_2_1_28_1","unstructured":"SPECS Consortium. 2015. The WebPool Cookbook - Bitbucket repository . https:\/\/bitbucket.org\/specs-team\/specs-mechanism-enforcement-webpool\/overview .  SPECS Consortium. 2015. The WebPool Cookbook - Bitbucket repository . https:\/\/bitbucket.org\/specs-team\/specs-mechanism-enforcement-webpool\/overview ."},{"key":"e_1_3_2_1_29_1","unstructured":"The Apache Software Foundation. 2018. The Apache HTTP Server Project web site . https:\/\/httpd.apache.org\/.  The Apache Software Foundation. 2018. The Apache HTTP Server Project web site . https:\/\/httpd.apache.org\/."},{"volume-title":"An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). 723--726","author":"Villarreal-Vasquez M.","key":"e_1_3_2_1_30_1","unstructured":"M. Villarreal-Vasquez , B. Bhargava , P. Angin , N. Ahmed , D. Goodwin , K. Brin , and J. Kobes . 2017 . An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). 723--726 . M. Villarreal-Vasquez, B. Bhargava, P. Angin, N. Ahmed, D. Goodwin, K. Brin, and J. Kobes. 2017. An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). 723--726."},{"key":"e_1_3_2_1_31_1","unstructured":"Willy Tarreau. 2018. The HAProxy web site . http:\/\/www.haproxy.org\/.  Willy Tarreau. 2018. The HAProxy web site . http:\/\/www.haproxy.org\/."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 5th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268966.3268975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:20Z","timestamp":1750212440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":30,"alternative-id":["10.1145\/3268966.3268975","10.1145\/3268966"],"URL":"https:\/\/doi.org\/10.1145\/3268966.3268975","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}