-
1
-
-
70350606938
-
Data management in the clouds: Limitations and opportunities
-
Abadi, D.J. (2009) 'Data management in the clouds: limitations and opportunities', IEEE Data Engineering, Vol. 32, No. 1, pp.3-12.
-
(2009)
IEEE Data Engineering
, vol.32
, Issue.1
, pp. 3-12
-
-
Abadi, D.J.1
-
2
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. and Zaharia, M. (2009) Above the Clouds: A Berkeley View of Cloud Computing, Technical Report No. UCB/EECS-2009-28, University of California at Berkley.
-
(2009)
Technical Report No. UCB/EECS-2009-28, University of California at Berkley
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
12244306739
-
An information security meta-policy for emergent organizations
-
Baskerville, R. and Siponen, M. (2002) 'An information security meta-policy for emergent organizations', Logistics Information Management, Vol. 15, Nos. 5-6, pp.337-346.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 337-346
-
-
Baskerville, R.1
Siponen, M.2
-
4
-
-
33644542600
-
A usability study of internet privacy policies for state and commercial websites
-
Becker, S.A. (2004) 'A usability study of internet privacy policies for state and commercial websites', International Journal of Services and Standards, Vol. 1, No. 1, pp.52-68.
-
(2004)
International Journal of Services and Standards
, vol.1
, Issue.1
, pp. 52-68
-
-
Becker, S.A.1
-
5
-
-
77949840689
-
Gartner: Seven cloud-computing security risks
-
Brodkin, J. (2008) 'Gartner: seven cloud-computing security risks', Infoworld, pp.1-3.
-
(2008)
Infoworld
, pp. 1-3
-
-
Brodkin, J.1
-
6
-
-
77949797000
-
-
Available online at, accessed on 27 October 2009
-
Brenner, B. (2009) 'The curse of cloud security', NetWorkWorld. Available online at: http://www.networkworld.com/news/2009/102709-the-curse-of-cloud.html (accessed on 27 October 2009).
-
(2009)
The Curse of Cloud Security
-
-
Brenner, B.1
-
8
-
-
48649083931
-
Information security management - a practical approach
-
Dey, M. (2007) 'Information security management - a practical approach', IEEE, pp.1-6.
-
(2007)
IEEE
, pp. 1-6
-
-
Dey, M.1
-
9
-
-
70349459300
-
Cloud computing: Distributed internet computing for IT and scientific research
-
Dikaiakos, M.D., Pallis, G., Katsaros, D., Mehra, P. and Vakali, A. (2009) 'Cloud computing: distributed internet computing for IT and scientific research', IEEE Computer Society, Vol. 13, No. 5, pp.10-13.
-
(2009)
IEEE Computer Society
, vol.13
, Issue.5
, pp. 10-13
-
-
Dikaiakos, M.D.1
Pallis, G.2
Katsaros, D.3
Mehra, P.4
Vakali, A.5
-
10
-
-
1142292428
-
Managing vulnerabilities of information systems to security incidents
-
Farahmand, F., Navathe, S.B., Enslow, P.H. and Sharp, G.P. (2003) 'Managing vulnerabilities of information systems to security incidents', Proceedings of the 5th International Conference on Electronic Commerce, ACM, pp.348-354.
-
(2003)
Proceedings of the 5th International Conference on Electronic Commerce, ACM
, pp. 348-354
-
-
Farahmand, F.1
Navathe, S.B.2
Enslow, P.H.3
Sharp, G.P.4
-
12
-
-
46749091723
-
Why users (fail to) read computer usage policies
-
Foltz, B.C., Schwager, P.H. and Anderson, J.E. (2008) 'Why users (fail to) read computer usage policies', Industrial Management & Data Systems, Vol. 108, No. 6, pp.701-712.
-
(2008)
Industrial Management & Data Systems
, vol.108
, Issue.6
, pp. 701-712
-
-
Foltz, B.C.1
Schwager, P.H.2
Anderson, J.E.3
-
15
-
-
77949833655
-
Cloud computing and cyber defense, white paper
-
Available online at
-
Gourley, B. (2009) 'Cloud computing and cyber defense, white paper', National Security. Available online at: http://www.whitehouse.gov/files/ documents/cyber/Gourley-Cloud-Computing-and-Cyber-Defense-21-Mar-2009.pdf.
-
(2009)
National Security
-
-
Gourley, B.1
-
16
-
-
34248524413
-
Organizational culture of customer care: Market orientation and service quality
-
Green, K.W., Chakrabarty, S. and Whitten, D. (2007) 'Organizational culture of customer care: market orientation and service quality', International Journal of Services and Standards, Vol. 3, No. 2, pp.137-153.
-
(2007)
International Journal of Services and Standards
, vol.3
, Issue.2
, pp. 137-153
-
-
Green, K.W.1
Chakrabarty, S.2
Whitten, D.3
-
18
-
-
77949836922
-
Cloud computing: Finding the silver lining
-
Available online at
-
Hanna, S. (2009) 'Cloud computing: finding the silver lining', Juniper Networks. Available online at: http://www.ists.dartmouth.edu/docs/ HannaCloudComputingv2.pdf.
-
(2009)
Juniper Networks
-
-
Hanna, S.1
-
19
-
-
85024260157
-
Cloud computing: A software migrates from local PCs to distant internet servers, users and developers alike go along for the ride
-
Hayes, B. (2008) 'Cloud computing: a software migrates from local PCs to distant internet servers, users and developers alike go along for the ride', Communication of the ACM, Vol. 51, No. 7, pp.9-11.
-
(2008)
Communication of the ACM
, vol.51
, Issue.7
, pp. 9-11
-
-
Hayes, B.1
-
20
-
-
9744278382
-
A novel cloud-based trust model for pervasive computing
-
He, R., Niu, J., Yuan, M. and Hu, J. (2004) 'A novel cloud-based trust model for pervasive computing, IEEE, pp.693-700.
-
(2004)
IEEE
, pp. 693-700
-
-
He, R.1
Niu, J.2
Yuan, M.3
Hu, J.4
-
22
-
-
77949848041
-
State-of-the-art information security management systems with ISO/IEC 27001:2005
-
January-February
-
Humphrey, T. (2006) 'State-of-the-art information security management systems with ISO/IEC 27001:2005', ISO Management Systems, January-February, pp.15-18.
-
(2006)
ISO Management Systems
, pp. 15-18
-
-
Humphrey, T.1
-
23
-
-
77949781620
-
-
Infosecurity Europe, Available online at, accessed on 19 February 2009
-
Infosecurity Europe (2009) Cloud computing security survey results. Available online at: http://www.prosecurityzone.com/Customisation/News/ Education-Training-and-Professional-Services/Exhibitions-and-Trade-Shows/ Cloud-computing-security-survey-results.asp (accessed on 19 February 2009).
-
(2009)
Cloud Computing Security Survey Results
-
-
-
25
-
-
74349113474
-
On technical security issues in cloud computing
-
2009
-
Jensen, M., Schwenk, J., Gruschka, N. and Iacono, L. (2009) 'On technical security issues in cloud computing', IEEE International Conference, IEEE, 2009.
-
(2009)
IEEE International Conference, IEEE
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.4
-
26
-
-
33947408114
-
A framework for the management of information security risks
-
Jones, A. (2007) 'A framework for the management of information security risks', BT Technology Journal, Vol. 25, No. 1, pp.30-36.
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 30-36
-
-
Jones, A.1
-
27
-
-
59849089966
-
Is cloud computing really ready for prime time?
-
January
-
Leavitt, N. (2009, January) 'Is cloud computing really ready for prime time?', IEEE Computer Society, pp.15-20.
-
(2009)
IEEE Computer Society
, pp. 15-20
-
-
Leavitt, N.1
-
28
-
-
34547121214
-
Applying ISO 17799:2005 in information security management
-
Lee, M-C. and Chang, T. (2007) 'Applying ISO 17799:2005 in information security management', International Journal of Services and Standards, Vol. 3, No. 3, pp.352-373.
-
(2007)
International Journal of Services and Standards
, vol.3
, Issue.3
, pp. 352-373
-
-
Lee, M.-C.1
Chang, T.2
-
29
-
-
43049134342
-
Developing evaluation standards of e-learning courses by the analytic hierarchy process
-
Liu, C. (2007) 'Developing evaluation standards of e-learning courses by the analytic hierarchy process', International Journal of Services and Standards, Vol. 3, No. 4, pp.476-490.
-
(2007)
International Journal of Services and Standards
, vol.3
, Issue.4
, pp. 476-490
-
-
Liu, C.1
-
30
-
-
77949842100
-
-
O'Reilly, Cambridge
-
Mather, I., Kumaraswamy, S. and Latif, S. (2009) Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly, Cambridge.
-
(2009)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
-
-
Mather, I.1
Kumaraswamy, S.2
Latif, S.3
-
31
-
-
33846704341
-
IT security: In search of the holy grail
-
Oppliger, R. (2007) 'IT security: in search of the holy grail', Communications of the ACM, Vol. 50, No. 2, pp.96-98.
-
(2007)
Communications of the ACM
, vol.50
, Issue.2
, pp. 96-98
-
-
Oppliger, R.1
-
32
-
-
77949858931
-
-
Available online at
-
Rash, W. (2009) 'Is cloud computing secure? Prove it', eWeek, pp.1-3. Available online at: http://www.eweek.com/c/a/Cloud-Computing/Is-Cloud- Computing-Secure-Prove-It-849274/.
-
(2009)
Is Cloud Computing Secure? Prove it
, pp. 1-3
-
-
Rash, W.1
-
33
-
-
74049152260
-
Hey, you. Get off of my cloud: Exploring information leakage in third-party compute clouds
-
9-13 November 2009, Chicago, Illinois
-
Ristenpart, T., Tromer, E., Shacham, H. and Savage, S. (2009) 'Hey, you. Get off of my cloud: exploring information leakage in third-party compute clouds', CCS'09, 9-13 November 2009, Chicago, Illinois.
-
(2009)
CCS'09
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
34
-
-
34547798595
-
Archetypal behavior in computer security
-
Rosenfeld, S.N., Rus, I. and Cukier, M. (2007) 'Archetypal behavior in computer security', Journal of Systems and Software, Vol. 80, No. 10, pp.1594-1606.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.10
, pp. 1594-1606
-
-
Rosenfeld, S.N.1
Rus, I.2
Cukier, M.3
-
35
-
-
0000048723
-
An exposition of the AHP in reply to the paper "remarks on the analytic hierarchy process"
-
Saaty, T.L. (1990) 'An exposition of the AHP in reply to the paper "remarks on the analytic hierarchy process"', Management Science, Vol. 36, No. 3, pp.259-268.
-
(1990)
Management Science
, vol.36
, Issue.3
, pp. 259-268
-
-
Saaty, T.L.1
-
36
-
-
77949779615
-
-
Available online at
-
San Martin, C.V. (2009) Jurisdictional aspects of cloud computing. Available online at: http://www.coe.int/t/dghl/cooperation/economiccrime/ cybercrime/Documents/Reports-Presentations/2079%20if09%20pres%20cristos%20cloud. pdf.
-
(2009)
Jurisdictional Aspects of Cloud Computing
-
-
San Martin, C.V.1
-
38
-
-
0242365403
-
A dynamic risk model for information technology security in a critical infrastructure environment
-
Santa Barbara, California. Available online at
-
Saunders, J. (2003) 'A dynamic risk model for information technology security in a critical infrastructure environment', Proceedings of the 10th Conference on Risk-Based Decision Making in Water Resources, ASCE, Santa Barbara, California. Available online at: http://www.johnsaunders.com/papers/ riskcip/RiskConference.htm.
-
(2003)
Proceedings of the 10th Conference on Risk-Based Decision Making in Water Resources, ASCE
-
-
Saunders, J.1
-
39
-
-
34248596042
-
Strategic aspects of electronic document encryption
-
Smith, A.D. (2007) 'Strategic aspects of electronic document encryption', International Journal of Services and Standards, Vol. 3, No. 2, pp.203-221.
-
(2007)
International Journal of Services and Standards
, vol.3
, Issue.2
, pp. 203-221
-
-
Smith, A.D.1
-
41
-
-
77949819684
-
Cloud computing and data security: Looking before you leap
-
25 August 2009 Available online at
-
Stanley, N. (2009) 'Cloud computing and data security: looking before you leap', Bloor, 25 August 2009 Available online athttp://www.bloorresearch.com/ analysis/11466/cloud-computinglooking-before-you-leap.html.
-
(2009)
Bloor
-
-
Stanley, N.1
-
42
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. (1990) 'Effective IS security: an empirical study', Information Systems Research, Vol. 1, No. 3, pp.255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
43
-
-
64949196361
-
The implementation of Deming's system model to improve security management: A case study
-
Tang, J. (2008) 'The implementation of Deming's system model to improve security management: a case study', International Journal of Management, Vol. 25, No. 1, pp.54-68.
-
(2008)
International Journal of Management
, vol.25
, Issue.1
, pp. 54-68
-
-
Tang, J.1
-
45
-
-
77949820721
-
-
7 September 2009. Available online at
-
Vijayan, J. (2009) 'Google pursue government biz: security concern: loom', Business Week, 7 September 2009. Available online at: http://www.businessweek.com/technology/content/sep2009/tc20090917-122270.htm.
-
(2009)
Google Pursue Government Biz: Security Concern: Loom
-
-
Vijayan, J.1
-
47
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Wang, Q., Wang, C., Li, J., Ren, K. and Lou, W. (2009) 'Enabling public verifiability and data dynamics for storage security in cloud computing', ESORICS, pp.355-370.
-
(2009)
ESORICS
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
48
-
-
85042415733
-
The real problems with cloud computing
-
24 August 2009. Available online at
-
Winkler, I. (2009) 'The real problems with cloud computing', CSO, 24 August 2009. Available online at: http://www.csoonline.com/article/500344/ Winkler-The-Real-Problems-With-Cloud-Computing.
-
(2009)
CSO
-
-
Winkler, I.1
-
49
-
-
34447298085
-
Threats and countermeasures for information system security: A cross-industry study
-
Yeh, Q.J. and Chang, A.J.T. (2007) 'Threats and countermeasures for information system security: a cross-industry study', Information & Management, Vol. 44, No. 5, pp.480-491.
-
(2007)
Information & Management
, vol.44
, Issue.5
, pp. 480-491
-
-
Yeh, Q.J.1
Chang, A.J.T.2
-
50
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive responses
-
Yue, W. and Cakanyildrim, M. (2007) 'Intrusion prevention in information systems: reactive and proactive responses', Journal of Management Information Systems, Vol. 24, No. 1, pp.329-353.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.1
Cakanyildrim, M.2
|