scholarly journals Business in the cloud application management of information systems

2014 ◽  
Vol 2 (2) ◽  
pp. 37-44
Author(s):  
Marija Marković-Blagojević ◽  
Đorđe Ilić ◽  
Dijana Petkov
Author(s):  
Holger Schrödl ◽  
Stefan Wind

In industrial practice, cloud computing is becoming increasingly established as an option for formulating cost-efficient and needs-oriented information systems. Despite the increasing acceptance of cloud computing within the industry, many fundamental questions remain unanswered, or are answered only partially. Besides issues relating to the best architectures, legal issues, and pricing models, suppliers of cloud-based solutions are faced with the issue of appropriate requirements engineering. This means eliciting optimal understanding of the customer’s requirements and implementing this into appropriate requirements of the solution to be realised. This chapter examines selected, established requirements engineering methods in order to study the extent to which they can be applied to the specific requirements of cloud-based solutions. Furthermore, it develops a comparison framework containing the features of cloud computing. This comparison framework is applied to four established process models for requirements engineering. Recommendations for a requirements engineering process adapted to cloud computing are derived.


2008 ◽  
pp. 2991-3005
Author(s):  
Gregorio Martínez Perez ◽  
Félix J. García Clemente ◽  
Antonio F. Gómez Skarmeta

Network, service, and application management today faces numerous challenges, ones that older ways of doing things cannot solve. The concept of policy-based management (PBM) addresses some of these problems and offers possible solutions. It provides a system-wide view of the network and its services and applications, and shifts the emphasis of network management and monitoring away from specific devices and interfaces toward users and applications. This chapter describes the technology on the policy-based management paradigm which is consideredrelevant for providing a common base for researchers and practitioners who need to understand the current status of this emerging technology and how it can be applied to the Web and information systems security field.


2013 ◽  
pp. 239-286
Author(s):  
Christoph Fehling ◽  
Frank Leymann ◽  
Ralph Retter ◽  
Walter Schupeck ◽  
Peter Arbitter

Sign in / Sign up

Export Citation Format

Share Document