Summary
[This report includes a final version of the description of the mechanisms and tools that MUSA offers to define the security constraints in multi-cloud application components and in the composed SLA in order they can be monitored at runtime for a self-protective modus operandi.]
More information & hyperlinks