Understanding SLA elements in cloud computing

Marco Comuzzi, Guus Jacobs, Paul Grefen

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

Cloud computing security, interoperability, and vendor lock-in are likely to act as inhibitors of the widespread adoption of cloud computing in organizations. This calls for relational and contractual mechanisms to articulate the desired outcomes of service provisioning and acceptable behavior of service recipients and providers. In this paper we conducted a qualitative study interviewing industry experts to understand the extent to which SLA specifications in traditional IT services outsourcing can be applied in cloud computing, identifying elements becoming redundant or not applicable, and new elements capturing the specificity of the business relationships in cloud computing.

Original languageEnglish
Title of host publicationCollaborative Systems for Reindustrialization - 14th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2013, Proceedings
EditorsL.M. Camarinha-Matos, R.J. Scherer
Place of PublicationBerlin
PublisherSpringer
Pages385-392
Number of pages8
ISBN (Electronic)978-3-642-40543-3
ISBN (Print)978-3-642-40542-6
DOIs
Publication statusPublished - 1 Dec 2013
Event14th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2013 - Dresden, Germany
Duration: 30 Sept 20132 Oct 2013

Publication series

NameIFIP Advances in Information and Communication Technology
Volume408
ISSN (Print)1868-4238

Conference

Conference14th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2013
Country/TerritoryGermany
CityDresden
Period30/09/132/10/13

Keywords

  • Cloud computing
  • Contract
  • IT outsourcing
  • SLA

Fingerprint

Dive into the research topics of 'Understanding SLA elements in cloud computing'. Together they form a unique fingerprint.

Cite this