메뉴 건너뛰기




Volumn , Issue , 2010, Pages 280-288

QUIRC: A quantitative impact and risk assessment framework for cloud security

Author keywords

CIAMAU; Cloud computing; Delphi method; Impact; Risk; Risk Asessment; Security; STRIDE

Indexed keywords

CIAMAU; CLOUD COMPUTING; DELPHI METHOD; IMPACT; SECURITY; STRIDE;

EID: 77957948993     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2010.22     Document Type: Conference Paper
Times cited : (198)

References (25)
  • 4
    • 77957964372 scopus 로고    scopus 로고
    • accessed on January 25, 2010
    • IDC Cloud Computing Survey http://blogs.idc.com/ie/?p=210 accessed on January 25, 2010.
    • IDC Cloud Computing Survey
  • 6
    • 77957970534 scopus 로고    scopus 로고
    • A cloud architecture and platform for Scientific Computing as a Service (SCaaS)
    • in review
    • Saripalli, K.P., Oldenberg, C., Walters, B. and Radheshyam, N. (2010) A Cloud Architecture and Platform for Scientific Computing as a Service (SCaaS) ACM CloudScience2010 (in review).
    • (2010) ACM CloudScience2010
    • Saripalli, K.P.1    Oldenberg, C.2    Walters, B.3    Radheshyam, N.4
  • 7
    • 77957934327 scopus 로고    scopus 로고
    • The top cyber security risks
    • Sept., accessed on January 18, 2010
    • The Top Cyber Security Risks, SAN Institute Report (Sept. 2009) http://www.sans.org/top-cyber-security-risks/accessed on January 18, 2010.
    • (2009) SAN Institute Report
  • 9
    • 77954327465 scopus 로고    scopus 로고
    • What's new about cloud computing security?
    • Berkeley, January 20, 2010, accesed on February 18, 2010
    • Chen, Y., Paxson, V. and Katz, R. H. (2010) What's New About Cloud Computing Security? University of California, Berkeley Report No. UCB/EECS-2010-5 January 20, 2010 http://www.eecs.berkeley.edu/Pubs/TechRpts/ 2010/EECS-2010-5.pdf accesed on February 18, 2010.
    • (2010) University of California, Report No. UCB/EECS-2010-5
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 11
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security trade-offs
    • Springer Berlin/Heidelberg,/2007
    • Elahi, G. and Yu, E. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs; Lecture Notes in Computer Science Springer Berlin/Heidelberg Volume 4801/2007.
    • Lecture Notes in Computer Science , vol.4801
    • Elahi, G.1    Yu, E.2
  • 12
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • Chicago, IL, USA
    • Ristenpart, T., Tromer, E., Hovav Shacham, H. and Stefan Savage, S. (2009) Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, CCS'09, Chicago, IL, USA.
    • (2009) CCS'09
    • Ristenpart, T.1    Tromer, E.2    Hovav Shacham, H.3    Stefan Savage, S.4
  • 13
    • 77957965398 scopus 로고    scopus 로고
    • accessed on January 11, 2010
    • OWASP Top 10 Web Security Vulnerabilities (2007) accessed on January 11, 2010 http://www.owasp.org/index.php/Top-10-2007.
    • (2007) OWASP Top 10 Web Security Vulnerabilities
  • 14
    • 77957935599 scopus 로고    scopus 로고
    • Web2.0
    • Web2.0 http://www.net-security.org/article.php?id=949&p=4.
  • 17
    • 2642515073 scopus 로고    scopus 로고
    • Risk and hazard assessment for projects involving the geological sequestration of CO2
    • Gale, J. and Y. Kaya (eds.), Kyoto, Japan, Elsevier Ltd. (2003)
    • Saripalli, K.P., Mahasenan, N.M. and Cook, E.M., 2003. Risk and hazard assessment for projects involving the geological sequestration of CO2 In: Gale, J. and Y. Kaya (eds.) Sixth International Greenhouse Gas Control Conference, Kyoto, Japan, pp. 285-289. Elsevier Ltd. (2003).
    • (2003) Sixth International Greenhouse Gas Control Conference , pp. 285-289
    • Saripalli, K.P.1    Mahasenan, N.M.2    Cook, E.M.3
  • 19
    • 77957969733 scopus 로고    scopus 로고
    • Accessed on Jan 15, 2010 from
    • RAND Corporation. (2007). A collection of RAND publications on the Delphi method. Accessed on Jan 15, 2010 from http://www.rand.org/pardee/pubs/ methodologies.html#delphi.
    • (2007) A Collection of RAND Publications on the Delphi Method
  • 20
    • 77957935371 scopus 로고    scopus 로고
    • The Delphi technique: What is it?
    • March 1996. Retrieved from
    • Stuter, L.M. (1996). The Delphi Technique: What is it?. Lynn's Educational and Research Network, March 1996. Retrieved from http://www.learnusa.com/transformation-process/acf001.htm.
    • (1996) Lynn's Educational and Research Network
    • Stuter, L.M.1
  • 21
    • 77249103692 scopus 로고    scopus 로고
    • A modified Delphi approach to a new card sorting methodology
    • November
    • Paul, C. L. A Modified Delphi Approach to a New Card Sorting Methodology J. Usability Studies Vol. 4, Issue 1, November 2008, pp. 7-30.
    • (2008) J. Usability Studies , vol.4 , Issue.1 , pp. 7-30
    • Paul, C.L.1
  • 25
    • 0002052998 scopus 로고
    • New evidence about the existence of a bandwagon effect in the opinion formation process
    • Nadeau, R., Cloutier, E., & Guay, J.H. (1993). New Evidence About the Existence of a Bandwagon Effect in the Opinion Formation Process. International Political Science Review, 4(2), 203-213.
    • (1993) International Political Science Review , vol.4 , Issue.2 , pp. 203-213
    • Nadeau, R.1    Cloutier, E.2    Guay, J.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.