<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of Public Cloud Service Level Agreements - An Evaluation of Leading Software as a Service Providers</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Michael Seifert</string-name>
          <email>michael.seifert@wiwi.uni-halle.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>16th International Conference on Wirtschaftsinformatik</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Martin Luther University Halle-Wittenberg</institution>
          ,
          <addr-line>Chair for Information Management</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Universitaetsring 3</institution>
          ,
          <addr-line>06108 Halle (Saale)</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <fpage>22</fpage>
      <lpage>35</lpage>
      <abstract>
        <p>Public cloud and software as a service (SaaS) are two of the largest growing IT markets in recent years. Cloud customers need to assess whether the predefined service level agreements (SLAs) of public cloud providers are suitable for their business requirements. Due to the lack of a standard SLA formulation, cloud consumers have significant effort in analyzing SLAs against their compliance, which could be supported by semi-automated SLA management. SLAs of five leading SaaS providers with comparable public cloud business applications were examined as an as-is analysis. Using 18 derived parameters, the SLAs were formalized and evaluated in terms of matchmaking. The percentage of formalization and matchmaking among the five providers was found to vary between 20% and 73,3% across four SLA categories. Several contributions could be made for practitioners, but also for researchers on how to address the high degree of heterogeneity in public cloud SaaS SLAs.</p>
      </abstract>
      <kwd-group>
        <kwd>public cloud</kwd>
        <kwd>software as a service</kwd>
        <kwd>service level agreements</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The entire cloud market has been increasing continuously for years [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Especially
the market of public cloud [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] as well as of software as a service (SaaS) [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ] is growing
significantly. An increasing number of companies are deciding to consume their
business applications from the cloud instead of providing them by themselves [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. At
the same time, it enables software vendors to provide their solutions to a wide range of
customers [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. SaaS adoption is receiving increasing attention in practice [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The
possibility of fast implementation and a higher innovation cycle makes SaaS attractive
for businesses [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The billing model – from capital expenditure to operational
expenditure – is also a valid argument for adopting SaaS in comparison to traditional
application service consumption [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        But cloud providers are also affected by typical IT challenges. For example, cloud
providers may require downtime to perform maintenance on their IT infrastructure [
        <xref ref-type="bibr" rid="ref7 ref8">7,
8</xref>
        ]. At times, even large cloud providers, and therefore cloud users, experience
unplanned downtime [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. These planned and unplanned downtimes are usually defined
and described by cloud providers. This information is agreed and documented with the
customer in so-called service level agreements (SLA) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Many cloud providers
(usually public cloud providers) even publish their SLAs before signing a contract,
which makes it possible for potential customers to analyze them in advance [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ].
Accordingly, as a potential cloud customer, an upcoming decision to adopt cloud
services should always be based on the customer's own business criticality (e.g. for
possible unavailability of the service) to assess risk and service level compliance [
        <xref ref-type="bibr" rid="ref11 ref12">11,
12</xref>
        ].
      </p>
      <p>
        The main challenge here is the lack of cloud SLA standards. For potential cloud
customers, this means to evaluate the SLA individually against their own business
requirements. In addition, certain information that one provider describes in its public
SLA may be documented differently, or not at all, by another provider [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
When evaluating the SLAs of cloud providers on the customer side, it should also be
noted that new cloud services often have to be integrated or composed with existing IT
services (e.g. for master data exchange) [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]. This means that the cloud customer
must not only evaluate the components of the SLA for themselves but aggregate them
with SLA parameters of existing IT services to evaluate whether the composition of
services continues to meet their business requirements or at least does so at acceptable
risk [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ].
      </p>
      <p>
        In research, established models and methods are already proposed for the two scenarios,
(I) cloud service selection [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ] and (II) cloud service composition [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ]. There
are also numerous ontologies and meta-models published for standardization and
semiautomated SLA-aware selection and composition of cloud services [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ]. To enable
evaluation and enhancement of models and methods in research, as well as to provide
an overview to cloud customers and providers, the state of current cloud SLAs is
identified. This study was conducted with the following research questions (RQ), as an
as-is analysis of present-day public cloud SaaS SLA.
 RQ1: How can public cloud SaaS SLAs be formalized and categorized in a
consistent way?
 RQ2: How much can the formalization of SLA components be used to compare or
aggregate (named matchmaking) content from different providers?
 RQ3: What can be derived for research and practice from the results of this study?
To answer these research questions, the next section introduces the fundamental cloud
terminology and necessary concepts as a theoretical background. Next, the definition
of the study scope is provided by presenting the choice of the study sample and the
criteria for analysis. In addition, related work is presented in section 3 and compared
with the study scope at hand. Section 4 outlines the data collection of five leading public
cloud SaaS provider and their SLAs to make the research comprehensible. Furthermore,
the collected data is formalized and categorized here according to RQ1 in context of a
moderated focus group as a qualitative research method [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. In section 5, the five cloud
provider SLAs are instantiated according to the formalization. The parameters are then
analyzed in terms of their matchmaking to provide an answer to RQ2. The evaluation
and discussion of the analysis in section 6 is followed by a consideration of threats to
validity of this research in section 7. The article ends with the conclusion in which the
contributions to research and practice of this paper are summarized.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Theoretical Background</title>
      <p>
        The study is grounded on cloud terminology following the National Institute of
Standards and Technology (NIST). Three cloud service models and four cloud
deployment models can be distinguished [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        The service models are differentiated into Software as a Service (SaaS), Platform as a
Service (PaaS), and Infrastructure as a Service (IaaS) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. IaaS describes a cloud
service in which the provider delivers a complete IT infrastructure ready to use to the
consumer [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Thereby, computational as well as network and storage resources are
composed. With PaaS, further services on top of the composed IT infrastructure are
delivered to the customer, enabling application development, for example [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ].
With PaaS, customers get the opportunity to develop their own applications in the
cloud. With SaaS, usable software is provided to the cloud consumer on top of IT
infrastructure [
        <xref ref-type="bibr" rid="ref13 ref22">13, 22</xref>
        ]. SaaS is usually used by organizations when the cloud
application already meets the functional business requirements or when in-house
operation of the application is not preferred.
      </p>
      <p>
        The cloud deployment models are divided into Private Cloud, Public Cloud,
Community Cloud, and Hybrid Cloud [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Private clouds are services that are
deployed by the provider for a specific consumer organization [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. The private cloud
provider is usually in close interaction with the customer in order to consider their
business requirements. In contrast, the public cloud is about the provider making the
cloud service available to many users and in general [
        <xref ref-type="bibr" rid="ref22 ref24">22, 24</xref>
        ]. Due to the identical
composition, the cloud provider can deliver its service to a large number of customers
at the same time. Community cloud is similar to private cloud, but is in contrast
provided to be consumed by multiple organizations with similar concerns [
        <xref ref-type="bibr" rid="ref22 ref24">22, 24</xref>
        ].
Community cloud is used, for example, when several universities consume the same
cloud service, but want to have their respective customizing considered. Hybrid cloud
is defined as the combination of at least two cloud deployments [
        <xref ref-type="bibr" rid="ref22 ref24">22, 24</xref>
        ]. The most
common type of hybrid cloud is the combination of public cloud and private cloud. The
increasingly popular hybrid cloud driven by public cloud SaaS adoption has significant
impact on IT management [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        In order to ensure the contractual relationship between the cloud provider and the
customer, service level agreements are signed. A Service Level Agreement (SLA) is a
contract for an agreed IT service between a provider and a consumer [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The details
of the SLA must be underpinned by measurable parameters before and during the
service lifecycle in order to be comprehensible for the provider and the customer. To
measure and evaluate agreed performance levels of cloud services, qualities of service
(QoS) are commonly used [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>Study Scope and Related Work</title>
      <p>The study presented in this paper has a two-sided target audience, (I) research and (II)
practice. For researchers, the study aims to provide new practical insights for further
adaptation and evaluation of existing SLA management models and concepts (e.g.
smart contracts), as well as for cloud selection and composition methods and artifacts
(e.g. QoS aggregation). For practitioners, the study is of interest because it provides the
cloud consumer with an overview of what aspects of public SLA they can align their
business needs with. For cloud providers, the analysis serves as a guide to what other
providers present in their SLAs and how the survey sample focuses on various SLA
parameters and categories.</p>
      <p>
        For the analysis of the SLAs, two evaluation criteria formalization and matchmaking
are applied. Formalization is understood as the distillation of the described semantic in
the SLA as comparable parameters, as in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Formalization is therefore where
(I) the aspects are included in the respective SLA of the providers and (II) can be
assigned to the respective parameters defined.
      </p>
      <p>
        In order to support the SLA management, we use matchmaking as a second evaluation
criteria. Matchmaking is known as a method in QoS-compliant selection of Web
services [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. As an approach to examine constraint satisfaction problems, metrics are
checked for semantic and unit-specific equivalence [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. The SLA parameters are
checked by matchmaking to ensure that they are operable among providers, i.e. (I)
comparable in terms of cloud service selection or (II) aggregable in terms of cloud
service composition.
      </p>
      <p>
        The study is conducted with focus on one cloud model, namely SaaS. The decision was
made because it is expected that IT departments will increasingly need to evaluate SLA
compliance in the context of business requirements based on functional or strategic
preferences of a specific cloud application [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        It was also decided to focus on public cloud as the deployment model of the study. Both
the decision for the cloud model and the cloud deployment of the study are supported
by the high market relevance [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>Another decision regarding the scope of the study is the focus on business applications
(compared to cloud applications for private use). The reason for this is that the
commercial risk of insufficient service levels is significantly higher in the business
context. In order to ensure the best possible comparability of the SLAs of different
providers, business application cloud services were analyzed that are not industry
specific.</p>
      <p>
        The scope of the study aims to achieve the highest possible generic coverage, while at
the same time ensuring the highest possible transparency of the selection, in order to be
able to use the results of the study as broadly and specifically as possible. In the context
of the presented study scope, two related work studies are presented in Table 1.
The articles of Baset [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and Guila and Sood [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] are from the years 2012 and 2013.
Due to the passing time in between, it can be assumed that there are changes in the
common public cloud SLA. Accordingly, our investigation provides a refresh regarding
current cloud SLAs.
      </p>
      <p>In contrast to our fixed scope on SaaS, at least two different cloud models are
considered in each of the studies. Both studies also examined public cloud SLAs, so
publicly available SLAs served as the foundation.</p>
      <p>
        One issue of criticism in both studies is the comprehensibility of the vendor selection.
Neither article explains how the selection is made for each cloud model considered.
The article at hand will therefore describe the selection of vendors to be analyzed in
section 4 based on the maximum possible generalizability of our results.
Last, this study differs from related work in the depth of analysis. With the motivation
of semi-automated processing of the contents of SLA, the capability of matchmaking
for the parameters is examined in section 5. The studies by Baset [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and Guila and
Sood [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] each stop at the formalization of the SLA aspects, and thus do not examine
subsequent machine processing.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Data Collection and SLA Formalization</title>
      <p>
        The data collection starts with a search for market study on the valuation of cloud
computing. After screening the two studies on the cloud computing market of Gartner
Incorporated (Gartner) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and Synergy Research Group (SRG) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] the leading vendors
of SaaS were selected. The selection of our sample for public cloud SaaS business
applications goes back to the breakdown of the “Worldwide Market Share of Enterprise
SaaS” by SRG [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and is shown in Table 2.
      </p>
      <p>The cloud services depicted are all public cloud SaaS and, to ensure comprehensibility,
non-industry-specific IT applications for business context. Based on the top five
enterprise SaaS providers, administrative business applications were selected that could
potentially be used in a variety of organizations. Content management systems (CMS)
as well as customer relationship management (CRM) and enterprise resource planning
(ERP) systems are used in almost all organizations and thus provide a suitable basis for
an analysis.
The data collection process also required further assumptions. First, the formalization
of the SLA was performed in each case with reference to corresponding productive
system of the cloud service. This represents the aspiration to reflect the business risk in
the case of downtimes of the economically relevant systems. Second, in order to
formalize certain SLA components, a specific region in which the system is hosted had
to be assumed. For this we assumed to be from Germany and chose a region as close to
Germany as possible.</p>
      <p>
        The formalization was performed with the following sequence and in context of a
moderated focus group [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The focus group consisted of 6 researchers and 4
practitioners, each of whom was included in the discussion at both stages of
formalization (phase one and phase two).
      </p>
      <p>
        In phase one, the SLA documents [
        <xref ref-type="bibr" rid="ref28 ref29 ref30 ref31 ref32 ref33 ref34">28–34</xref>
        ] were reviewed completely for each of the
five providers in sequence and recorded in tabular form for each SLA-relevant
parameter. The naming of the tabular documentation of the parameters was inspired by
the respective SLA documents and the naming of the parameters of the related work
(shown in Table 1). Once an aspect was identified in a subsequent SLA that did not
semantically fit into existing parameters, a new parameter was created. Accordingly,
the dataset of formalized parameters in Table 3 represents a union of the aspects of the
five SLAs. Even if this means that not every parameter can be instantiated or mapped
for each of the five SLAs of a provider. Instead, this satisfies the objective of an
overview of possible aspects of a present-day public cloud SaaS SLA.
In phase two, after going through all the SLA documents, minor adjustments were made
to improve the understandability and comprehensibility of the parameters and
categories. For example, the distinction between maintenance and major release
upgrades was formulated consistently according to their three relevant aspects.
Potential shortcomings in the generation of the formalization are discussed in section 6
with respect to the validity of this study.
      </p>
      <p>As the result, a formalization of SLA corresponding to four categories, each with
associated two to six parameters (18 parameters in total), has been generated which is
shown in Table 3.
The first category, service commitment (cf. Table 1, Guila and Sood), bundles issues
around general availability and possible recovery from failures. Target service uptime
(1.1) indicates the percentage of minutes the system is available per month. Downtime
(1.2) specifies what is considered unavailable in terms of billing and exclusion (1.3)
describes when the provider is exempt from the responsibility of promised uptime.
Service timetable (1.4) describes the time when the system is up and running, even if
no one is working on it. This is relevant, for example, when the system performs
scheduled job processing during the night. Last, recovery time objective (RTO) (1.5)
and recovery point objective (RPO) (1.6) are common metrics for the time needed to
recover (RTO) and time of maximum data loss (RPO).</p>
      <p>Service maintenance (cf. Table 1, Baset) covers the aspects in which the service is
planned to be unavailable. This may happen for various reasons. On the one hand, due
to necessary system maintenance (2.2 - 2.4) on underlying infrastructures or due to
major/release upgrades of the software to a new release (2.5 - 2.7). The specified
parameters are therefore identical for maintenance and upgrades. The announcement
(2.2, 2.5) indicates the time before the unavailability of the application is announced.
The date (2.3, 2.6) determines at which time (day and time), according to the stated
time zone, the downtime usually takes place. The duration (2.4, 2.7) indicates how long
the downtime typically lasts from the start time date. The region parameter (2.1) is used
to specify the location where the service is hosted. This generally has an impact on the
scheduled downtimes.
The service credit category (cf. Table 1, Guila and Sood, Baset) combines all financial
aspects that are relevant once the service fails to fulfill the agreement and the customer
receives a fee back. Service credit calculation (3.1) indicates how the billing is
calculated in relation to the monthly fee for the cloud service. Whereby maximum credit
volume (3.3) represents the maximum of it. The credit notification (3.2) determines the
period of time in which the customer is supposed to submit the claim to the provider in
order to receive the service credit.</p>
      <p>The category service contract contains the potential termination of the contract for both
parties. The termination clause (4.1) defines the number of service level violations after
which the customer may terminate the contract for cause. End of life (4.2) specifies the
period of time in advance for the provider to terminate the cloud service.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Evaluation and Discussion</title>
      <p>The parameters have been instantiated via the SLA documents of the five providers (see
Table 4). The instantiation of the formalization and the capability to be comparable and
aggregable (matchmaking) is assessed for all parameters and evaluated across the
categories.</p>
      <p>With target service uptime it is noticeable that one provider (Salesforce) is not
matchable (adjective of matchmaking) because it does not specify a quantitative
availability. Downtimes can only be formalized for three vendors and are not matchable
there due to the complex wording. The exclusion of availability-reducing factors can
be formalized for all vendors. However, the fine details in the SLA are phrased in such
a linguistic way that they are not matchable. The service timetable is explicitly
described by three out of five providers. However, based on the description of all other
parameters, we assume that all providers offer 24/7 service. The formalization of
service timetable can therefore be questioned. The formalization of just one provider
with regard to the practically highly relevant RTO and RPO documentation is
highlighted as potential for improvement in cloud provider practice.</p>
      <p>Many cloud providers set planned downtimes depending on the usual business hours
per region. For example, these downtimes are usually scheduled for weekends.
However, if the cloud service of your choice is not offered in your region, this can lead
to scheduled downtimes during the week. Maintenance announcement is only defined
for two of the providers. The announcement for upgrades, on the other hand, can be
formalized for three providers, but due to vague descriptions it is only matchable for
one provider. In this context, matchable means that during the service lifecycle it is
possible to check automatically whether maintenance is scheduled by considering the
minimum number of days prior notification (as automatically check interval).
Maintenance date can be formalized for system maintenance and upgrades in five out
of ten potential parameters. All parameters are matchable and give cloud consumers, in
combination with maintenance duration, the possibility to compare the potential
maintenance windows (which times disrupt their business less) and to aggregate (which
maintenance days cover all components of their composite service).
Service credit is almost entirely formalizable across all parameters of four providers.
Even the credit calculation of the four different providers is very similar which makes
it easily matchable. However, it is noticeable that the maximum credit volume varies
significantly (between 10% to 100%). The relevance of this category is considered to
be quite high because, in a best-case scenario, the service credit should be able to
compensate for the loss caused by business interruption as risk transfer.
1.2 service not available to the users unable to login minutes the system is not
customer, except any - (excluded planned - available (excluded
excluded minutes downtimes) downtimes)
1.3 misbehavior of customer schedmuyleodradcolwesnutipmpeosrtfrom plliaminnniateapdtpiodronospwr(ineat.itgem.uenssea;twglieso)trto,f ciprreclaaunsmonsentdaabndlcoeewsconbnteitmyrooeln;d reugpuglraardmesa;cioonuntettrnooaflnpcreo,vmidajeorr
1.4 24/7 - - 24/7 24/7
1.5 - 12 - -
1.6 - 1 - -
2.1 America - EMEA EU Europe
2.2 - - busnionteifsiseddaaytsleinasatdfvivaence ten dmaayisntperniaonrcteo the
2.3 - - 22:00 (UTC) SAT, 22:00 (UTC) SAT, 22:00 (UTC)
2.4 - - 8 4 4
2.5 - - choose a specific weekend abpepfororexitmheatreellyeaosneedyaetaer busnionteifsiseddaaytsleinasatdfvivaence
2.6 - - - FRI, 22:00 (UTC) SAT, 4:00 (UTC)
2.7 - - 3 hours 6 hours 24 hours
3.1 per 1% below availability
&lt;&lt;&lt;&lt;9999995,0,5%9%%%--&gt;-&gt;-&gt;&gt;1215550%%%%fffefeeeeeee,,, s(e9ysr9oecv,urc9ireco)demnyidatoovinmusathogipllenayattibhf2dieo%lewift;yimcstrheiienrstdvshaieietcdseoixf &lt;&lt;&lt;999959,9%%%--&gt;-&gt;&gt;1520050%%%cccrrereeddditii,tt, - (p9e9r,51)y%oyuobruemlgoeowtn2tha%lvyacifleraeebdiiltitoyf
month period
Service contract can be formalized by one provider and is matchable with parameters
of other providers. Again, relevant aspects of the SLA are mapped, which could be used
for enrichment in the SLA of other providers.</p>
      <p>In order to get an overview of the results of the analysis, the assigned labels in Table 4
(formalizable, matchable) were evaluated quantitatively. The result of this analysis can
be seen in Table 5 and are discussed in the following.</p>
      <p>Service commitment is often not trivial to process by machine due to the lack of
formalizability, which is seen as a challenge and a risk for cloud consumers. In addition,
even if it can be formalized, it is often difficult to compare or aggregate it due to
overdefined terminology and exclusion (see 1.2, 1.3 Table 4).</p>
      <p>Service maintenance formalizability is basically enabled by three out of five providers.
The formalized parameters allow a suitable processing in general. It remains to be said
that both practice and research in the discovery or decision phase must nevertheless
reckon with uncertainty in the run-up to the announcement or even the lack of
announcement of maintenance. Maintenance must therefore be formalizable,
measurable and adaptable in later phases of the service level lifecycle.
Service credit formalizability and matchmaking has the highest percentage of all
categories. This shows that the calculation methods are similar across four depicting
providers and are therefore easy to process. Nevertheless, it remains interesting for
practice and research to include the maximum loss payment in the risk consideration
when deciding on the selection of an SLA.</p>
      <p>Service contract formalizability and matchmaking is limited to one provider. For the
service contract, analogous to the service credit, the challenge for both practice and
research is to consider it in the risk management of the cloud application decision.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Threats to Validity</title>
      <p>To demonstrate rigor and encourage further research, the threats of validity of this study
are discussed. Threats of validity are considered in terms of internal validity and
external validity.</p>
      <p>
        Internal validity refers specifically to whether an experimental treatment or condition
makes a difference to the outcome or not, and whether there is sufficient evidence to
substantiate the claim [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]. The following internal validity threats for this study were
identified and should be considered for interpretation or further research.
 Insufficient or improper SLA documents or information were collected by the
formalization procedure. Accordingly, it may be that the scores calculated for the
categories may be inaccurate.
 The selected sample of leading public cloud SaaS providers is chosen biased or is
insufficient. Potentially, adding more providers improves calculated category scores
and leads to more underrepresented parameters.
 The interpretation of the descriptions or the order of importance in the SLAs was
inaccurate or wrong. Our focus group was set up to evaluate the formalization;
another group may possibly come to different results.
 The evaluation of the matchmaking of the parameters was performed with the
knowledge of existing methods in SLA management. The actual applicability of the
labeled parameters is nevertheless to be verified in each case. The evaluation of SLA
management artifacts with the identified parameters is a promising field for further
research.
 The survey is statically time-based, so changes in SLAs over time can lead to other
results.
      </p>
      <p>
        External validity refers specifically to whether the results can be considered in
realworld environment [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]. The following external validity threats for this study were
identified and should be considered for interpretation or further research.
 It is possible that (1.) agreements besides the SLA between provider and customer
are made or (2.) further contractual documents affect the consideration.
 The generalization of our identified formalizability and matchmaking can be
challenged due to different requirements of the different application types.
7
      </p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>In this study, based on the motivation of an as-is analysis, five present-day public cloud
SaaS SLAs were analyzed in the context of service level compliance and risk
management. The study focus was intentionally set on (I) public cloud, (II) SaaS and
(III) business-critical applications in order to address the relevance of downtime-related
breakdowns in business processes.</p>
      <p>With the help of four derived SLA categories and 18 underlying SLA parameters, a
general formalizability (concerning at least one provider) was determined. Across the
four different categories, formalizability was found to range from an average 20% to
73.3% across the entire sample (concerning RQ1). The high variance in formalizability
confirms the common assumption of the lack of SLA standards in practice.
To enable semi-automated SLA management, all parameters were evaluated for
matchmaking (comparable and aggregable). Across the four different categories,
matchmaking was found to range from an average of 20% to 73.3% across the entire
sample (concerning RQ2). Matchmaking has high importance in the context of
ITsupported SLA management, and is threatened especially due to low rates (20%, 30%
and 40%) in three out of four categories. The emerging deficit can be closed on the one
hand (I) by further analysis of matchmaking or (II) by an additional manual evaluation
step of potential cloud customers.</p>
      <p>An extract of contributions to research and practice elaborated in section 5 are finally
summarized (concerning RQ3).
 Practitioners get an understanding of common and uncommon public cloud SaaS
SLA parameters and categories to analyze risk and service level compliance prior to
an adoption.
 It is also possible for practitioners to identify SLA aspects that may have a high
economic importance (e.g. RPO, RTO, planned downtimes) but may not be offered
by all providers.
 Researchers get an up-to-date view of SLA parameters that SLA management
methods and concepts must take into consideration in order to be applicable to
present-day clouds (e.g. temporal logic for downtime aggregation).
 Researchers should consider how business-critical SLA parameters (e.g., service
credit calculation and downtime exclusion) can be reflected in terms of risk
assessment extending traditional QoS aggregation (e.g., availability multiplication).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Gartner</given-names>
            <surname>Inc</surname>
          </string-name>
          .: Proportion of Enterprise IT Spending on Public Cloud Computing Continues to Increase, https://www.gartner.com/en/newsroom/pressreleases/2020-11-17
          <article-title>-gartner-forecasts-worldwide-public-cloud-end-userspending-to-</article-title>
          <string-name>
            <surname>grow-</surname>
          </string-name>
          18
          <string-name>
            <surname>-</surname>
          </string-name>
          percent-in-2021
          <source>(Accessed: 12.01</source>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. Synergy Research Group:
          <article-title>Quarterly SaaS Spending Reaches $20 billion as Microsoft Extends its Market Leadership</article-title>
          , https://www.srgresearch.com/articles/quarterly-saas
          <article-title>-spending-reaches-20-billionmicrosoft-extends-its-market-leadership (</article-title>
          <source>Accessed: 12.01</source>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>B.</given-names>
            <surname>Link</surname>
          </string-name>
          :
          <article-title>Considering the Company's Characteristics in Choosing between SaaS vs</article-title>
          .
          <article-title>On-Premise-ERPs</article-title>
          . In: Wirtschaftsinformatik (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bennett</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Munro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gold</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Layzell</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Budgen</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brereton</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>An Architectural model for service-based software with ultra rapid evolution</article-title>
          .
          <source>In: Proceedings, IEEE International Conference on Software Maintenance. Systems and software evolution in the era of the Internet : Florence, Italy, 7-9 November</source>
          ,
          <year>2001</year>
          . IEEE Computer Society, Los Alamitos, Calif. (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Benlian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hess</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buxmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Drivers of SaaS-Adoption - An Empirical Study of Different Application Types</article-title>
          .
          <source>Bus. Inf. Syst. Eng</source>
          .
          <volume>1</volume>
          ,
          <fpage>357</fpage>
          -
          <lpage>369</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>M.</given-names>
            <surname>Janssen</surname>
          </string-name>
          , Anton Joha:
          <article-title>Challenges for adopting cloud-based software as a service (saas) in the public sector</article-title>
          .
          <source>In: ECIS</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Baset</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>Cloud SLAs: Present and Future</article-title>
          .
          <source>SIGOPS Oper. Syst. Rev</source>
          .
          <volume>46</volume>
          ,
          <fpage>57</fpage>
          -
          <lpage>66</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gulia</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sood</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Comparative Analysis of Present Day Clouds using Service Level Agreements</article-title>
          .
          <source>IJCA 71</source>
          ,
          <issue>1</issue>
          -
          <fpage>8</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Paquette</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jaeger</surname>
            ,
            <given-names>P.T.</given-names>
          </string-name>
          , Wilson, S.C.
          <article-title>: Identifying the security risks associated with governmental use of cloud computing</article-title>
          .
          <source>Government Information Quarterly</source>
          <volume>27</volume>
          ,
          <fpage>245</fpage>
          -
          <lpage>253</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Patel</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ranabahu</surname>
            ,
            <given-names>A.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheth</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          :
          <article-title>Service Level Agreement in Cloud Computing. Kno.e.sis Publications, THE OHIO CENTER OF EXCELLENCE IN KNOWLEDGE-</article-title>
          <string-name>
            <surname>ENABLED</surname>
            <given-names>COMPUTING</given-names>
          </string-name>
          ,
          <volume>1</volume>
          -
          <fpage>10</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>P.</given-names>
            <surname>Hoberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wollersheim</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>Krcmar: The Business Perspective on Cloud Computing - A Literature Review of Research on Cloud Computing</article-title>
          . In: AMCIS (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Seifert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kühnel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>"HySLAC"- A Conceptual Model for Service Level Agreement Compliance in Hybrid Cloud Architectures</article-title>
          .
          <source>Proceedings of the 50th Annual Conference of the German Informatics Society, Lecture Notes in Informatics (LNI)</source>
          ,
          <fpage>195</fpage>
          -
          <lpage>208</lpage>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>C.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Su</surname>
          </string-name>
          , H.:
          <article-title>Software as a Service: Configuration and Customization Perspectives</article-title>
          .
          <source>In: 2008 IEEE Congress on Services Part II (services-2</source>
          <year>2008</year>
          ), pp.
          <fpage>18</fpage>
          -
          <lpage>25</lpage>
          . IEEE (
          <year>2008</year>
          - 2008)
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Andreas</surname>
            <given-names>Jede</given-names>
          </string-name>
          , Frank Teuteberg:
          <article-title>Understanding Socio-Technical Impacts Arising from Software-as-a-Service Usage in Companies</article-title>
          .
          <source>Bus Inf Syst Eng</source>
          <volume>58</volume>
          ,
          <fpage>161</fpage>
          -
          <lpage>176</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kritikos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Requirements for QoS-Based Web Service Description and Discovery</article-title>
          .
          <source>IEEE Trans. Serv. Comput. 2</source>
          ,
          <fpage>320</fpage>
          -
          <lpage>337</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Vakili</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Navimipour</surname>
            ,
            <given-names>N.J.</given-names>
          </string-name>
          :
          <article-title>Comprehensive and systematic review of the service composition mechanisms in the cloud environments</article-title>
          .
          <source>Journal of Network and Computer Applications</source>
          <volume>81</volume>
          ,
          <fpage>24</fpage>
          -
          <lpage>36</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. L.
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Dou</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , J. Chen:
          <article-title>A QoS-aware composition method supporting cross-platform service invocation in cloud environment</article-title>
          .
          <source>J. Comput. Syst. Sci</source>
          .
          <volume>78</volume>
          ,
          <fpage>1316</fpage>
          -
          <lpage>1329</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Xin</surname>
            <given-names>Zhao</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Liwei</given-names>
            <surname>Shen</surname>
          </string-name>
          , Xin Peng, Wenyun Zhao:
          <article-title>Toward SLA-constrained service composition: An approach based on a fuzzy linguistic preference model and an evolutionary algorithm</article-title>
          .
          <source>Information Sciences</source>
          <volume>316</volume>
          ,
          <fpage>370</fpage>
          -
          <lpage>396</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kritikos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plebani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Semantic SLAs for Services with QSLA</article-title>
          .
          <source>Procedia Computer Science</source>
          <volume>97</volume>
          ,
          <fpage>24</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Labidi</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mtibaa</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brabra</surname>
          </string-name>
          , H.:
          <article-title>CSLAOnto: A Comprehensive Ontological SLA Model in Cloud Computing</article-title>
          .
          <source>J Data Semant</source>
          <volume>5</volume>
          ,
          <fpage>179</fpage>
          -
          <lpage>193</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Morgan</surname>
          </string-name>
          , D.:
          <article-title>Focus Groups as Qualitative Research</article-title>
          . SAGE Publications, Inc, 2455 Teller Road,
          <source>Thousand Oaks California 91320 United States of America</source>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Mell</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grance</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The NIST definition of cloud computing</article-title>
          .
          <source>National Institute of Standards and Technology</source>
          , Gaithersburg,
          <string-name>
            <surname>MD</surname>
          </string-name>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Yangui</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ravindran</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bibani</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glitho</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ben</surname>
            Hadj-Alouane,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morrow</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polakos</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          :
          <article-title>A platform as-a-service for hybrid cloud/fog environments</article-title>
          .
          <source>In: IEEE LANMAN 2016. The 22nd IEEE International Symposium on Local and Metropolitan Area Networks, June 13-15</source>
          ,
          <year>2016</year>
          , Rome, Italy, pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . IEEE, Piscataway, NJ (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Goyal</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review</article-title>
          .
          <source>IJCNIS 6</source>
          ,
          <fpage>20</fpage>
          -
          <lpage>29</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Breiter</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naik</surname>
            ,
            <given-names>V.K.</given-names>
          </string-name>
          :
          <article-title>A Framework for Controlling and Managing Hybrid Cloud Service Integration</article-title>
          . In: Campbell,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (ed.)
          <source>2013 IEEE International Conference on Cloud Engineering (IC2E)</source>
          .
          <fpage>25</fpage>
          -
          <issue>27</issue>
          <year>March 2013</year>
          , San Francisco Bay, California, pp.
          <fpage>217</fpage>
          -
          <lpage>224</lpage>
          . IEEE, Piscataway, NJ (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Suakanto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Supangkat</surname>
            ,
            <given-names>S.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suhardi</surname>
          </string-name>
          , Saragih, R.:
          <source>Performance Measurement of Cloud Computing Services</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Kritikos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Semantic QoS Metric Matching</article-title>
          . In: Bernstein,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Gschwind</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.</surname>
          </string-name>
          <source>(eds.) 4th European Conference on Web Services</source>
          ,
          <year>2006</year>
          . ECOWS '
          <volume>06</volume>
          ;
          <fpage>4</fpage>
          -
          <lpage>6</lpage>
          December 2006, Zurich, Switzerland. IEEE Computer Society, Los Alamitos, Calif. [u.a.] (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>Adobe</given-names>
            <surname>Inc</surname>
          </string-name>
          .: Service Level Agreement, https://www.adobe.com/content/dam/cc/en/legal/terms/enterprise/pdfs/MasterSL A-2016DEC5.pdf
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Adobe</surname>
          </string-name>
          <article-title>Inc.: Service Level Exhibit - AEM as a Cloud Service</article-title>
          , https://www.adobe.com/content/dam/cc/en/legal/terms/enterprise/pdfs/SLAExhib it-AEMCloudService-2019DEC12.
          <source>pdf (Accessed: 12.01</source>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          <article-title>Corporation: Service Level Agreement for Microsoft Online Services</article-title>
          , https://www.microsoftvolumelicensing.com/Downloader.aspx?documenttype=
          <source>OS CS&amp;lang=English (Accessed: 12.01</source>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Oracle Corporation: Oracle SaaS Public Cloud Services-Pillar</surname>
            <given-names>Document</given-names>
          </string-name>
          , https://www.oracle.com/assets/saas-public
          <source>-cloud-services-pillar-3610529.pdf (Accessed: 12.01</source>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <given-names>Salesforce</given-names>
            <surname>Inc</surname>
          </string-name>
          .: Master Subscription Agreement, https://c1.sfdcstatic.com/content/dam/web/en_us/www/documents/legal/salesforc e_MSA.
          <source>pdf (Accessed: 12.01</source>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <given-names>Salesforce</given-names>
            <surname>Inc</surname>
          </string-name>
          .: Preferred Salesforce Maintenance Schedule, https://help.salesforce.
          <source>com/articleView?id=000331027&amp;type=1&amp;mode=1 (Accessed: 12.01</source>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>SAP</surname>
            <given-names>SE</given-names>
          </string-name>
          :
          <article-title>Service Level Agreement for SAP Cloud Services</article-title>
          , https://assets.cdn.sap.com/agreements/product
          <article-title>-use-and-supportterms/cls/en/service-level-agreement-for-sap-cloud-services-english-v7-2020</article-title>
          .pdf (Accessed:
          <fpage>12</fpage>
          .
          <fpage>01</fpage>
          .
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>J. Siegmund</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Siegmund</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <article-title>Apel: Views on Internal and External Validity in Empirical Software Engineering</article-title>
          .
          <source>In: 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering</source>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>19</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>