|
Abbreviations | Words |
|
PaaS | Platform-as-a-service |
SaaS | Software-as-a-service |
IaaS | Infrastructure-as-a-service |
Pb | Public cloud |
Pr | Private cloud |
HC | Hybrid cloud |
NE | Nash equilibrium |
CSU (s) | Cloud service user (s) |
CSP (s) | Cloud service provider (s) |
CI | Cloud infrastructure |
SSG | Security Stackleberg game |
FEBM | Feedback evaluation and Bayesian model |
CSPM | Cloud security and privacy model |
NIST | National Institute of Standards and Technology |
ACPML | Access control and privilege management layer |
CCAF | Cloud computing adoption framework |
BPMN | Business process modeling Notation |
CISL | Cloud infrastructure security layer |
PESL | Physical environmental security layer |
HTTP | Hypertext transfer protocol |
DDoS | Distributed denial of service |
SDLC | Software development life cycle |
ABDS | Attribute-based data sharing |
DAC | Data access control |
SK (s) | Secret key (s) |
PSSFP | Previous-selected-server-first policy |
MOO | Multiobjective optimization |
DFS | Distributed file system |
CCTV | Closed circuit television |
IM-SecaaS | Intrusion management Security-as-a-Service |
OPEX | Operational expense model |
IDPS | Intrusion detection/prevention system |
CEPM | Compliance enforcement and policy management |
SSDP | Simulation software development process |
ADIRS | Attack detection and intrusion rejection system |
CSA | Cloud security Alliance |
SecSLA | Security service level agreement |
QPT | Quantitative policy trees |
QHP | Quantitative hierarchical process |
QoS | Quality of service |
DoS | Denial of service |
PM | Privacy manager |
GA | Genetic algorithm |
SADP | Security-aware data placement |
PSO | Particle Swarm optimization |
ACO | Ant colony optimization |
CAS | Chaotic ant Swarm |
GA-CAS | Genetic algorithm-based chaotic ant Swarm |
MHA (s) | Metaheuristic algorithms |
NDTMSI | Nondeterministic task meta-Schedular integrated |
AES | Advanced encryption standard |
HEVC | High efficiency video coding |
IEVS | Intraencoded video stream |
TLS | Transport layer security |
SED2 | Secure efficient data distribution |
EDcon | Efficient data conflation |
MDMCO | Multidimensional and multiconstraint optimization |
BC (s) | Blockchain (s) |
BPDPP | Blockchain’s public and distributed peer-to-peer |
BWH | Block withholding |
PoW | Proof-of-Work |
PPLN | Pay-per-Last N |
SBOS | Security benchmark for open stack |
PKE | Public key encryption |
SLA (s) | Service level agreement (s) |
|