3.5. Management of User Requirements -- 3.5.1. Requirement Management Workflow -- 3.5.2. Challenges and Requirements -- 3.5.3. Categories and Delegation of User Requirements -- 3.5.4. Illustrative Example -- 3.6. Summary -- 3.7. Exercises -- References -- 4. Cloud Properties -- 4.1. Introduction -- 4.2. Adaptability Property -- 4.3. Resilience Property -- 4.4. Scalability Property -- 4.5. Availability Property -- 4.6. Reliability Property -- 4.7. Security and Privacy Property -- 4.8. Business Model -- 4.9. Summary -- 4.10. Exercises -- References -- 5. Automated Management Services -- 5.1. Introduction -- 5.2. Virtual Layer Self-managed Services -- 5.2.1. Adaptability as a Virtual Service -- 5.2.2. System Architect as a Virtual Service -- 5.2.3. Resilience as a Virtual Service -- 5.2.4. Scalability as a Virtual Service -- 5.2.5. Availability as a Virtual Service -- 5.2.6. Reliability as a Virtual Service -- 5.3. Virtual Services Interdependency
5.4. Application Layer Self-managed Services -- 5.4.1. Adaptability as an Application Service -- 5.4.2. Resilience as an Application Service -- 5.4.3. Scalability as an Application Service -- 5.4.4. Availability as an Application Service -- 5.4.5. Reliability as an Application Service -- 5.5. Application Services Interdependency -- 5.6. Security and Privacy by Design -- 5.7. Multi-tier Application Deployment in the Cloud -- 5.7.1. Application Architecture -- 5.7.2. Managed Services Interaction -- 5.8. Main Challenges and Requirements -- 5.8.1. Challenges -- 5.8.2. Requirements -- 5.9. Summary -- 5.10. Exercises -- References -- 6. Background -- 6.1. Topics Flow -- 6.2. Trusted Computing -- 6.2.1. Introduction -- 6.2.2. Trusted Platform Module -- 6.2.3. TCG Main Components -- 6.2.4. The TP Main Functions -- 6.2.5. Challenges in TCG Specifications -- 6.3. Summary -- References -- 7. Challenges for Establishing Trust in Clouds -- 7.1. Introduction