메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Towards wider cloud service applicability by security, privacy and trust measurements

Author keywords

Cloud services; Privacy metrics; Security metrics

Indexed keywords

CLOUD SERVICES; CRITICAL APPLICATIONS; CRITICAL DATA; INTERVIEW STUDY; PRIVACY AND TRUSTS; PRIVACY METRICS; RESEARCH DIRECTIONS; SECURITY AND PRIVACY; SECURITY METRICS;

EID: 78649624954     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAICT.2010.5612067     Document Type: Conference Paper
Times cited : (16)

References (27)
  • 1
    • 78149392355 scopus 로고    scopus 로고
    • A security metrics taxonomization model for software-intensive systems
    • Dec.
    • R. Savola, "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, pp. 197-206.
    • (2009) Journal of Information Processing Systems , vol.5 , Issue.4 , pp. 197-206
    • Savola, R.1
  • 2
    • 78149472349 scopus 로고    scopus 로고
    • Towards security effectiveness measurement utilizing risk-based security assurance
    • 2-4 Aug.
    • R. Savola, H. Pentikäinen, and M. Ouedraogo, "Towards security effectiveness measurement utilizing risk-based security assurance," ISSA '10, 2-4 Aug., 2010.
    • (2010) ISSA '10
    • Savola, R.1    Pentikäinen, H.2    Ouedraogo, M.3
  • 4
    • 77958019527 scopus 로고    scopus 로고
    • Development of measurable security for a distributed messaging system
    • R. Savola and H. Abie, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4 (2009), 2010.
    • (2009) International Journal on Advances in Security , vol.2 , Issue.4
    • Savola, R.1    Abie, H.2
  • 6
    • 62649153775 scopus 로고    scopus 로고
    • Multi-agent based security assurance monitoring system for telecommunication infrastructures
    • Berkeley, CA, USA Sep. 24-27
    • E. Bulut, D. Khadraoui, and B. Marquet, "Multi-agent based security assurance monitoring system for telecommunication infrastructures", CNIS 2007, Berkeley, CA, USA Sep. 24-27, 2007, 6 p.
    • (2007) CNIS 2007 , pp. 6
    • Bulut, E.1    Khadraoui, D.2    Marquet, B.3
  • 7
    • 70349117427 scopus 로고    scopus 로고
    • Object oriented software security estimation life cycle - Design phase perspective
    • S. Chandra and R. A. Khan, "Object oriented software security estimation life cycle - Design phase perspective", Journal of Software Engineering, 2008, Vol. 2, Issue 1, pp. 39-46.
    • (2008) Journal of Software Engineering , vol.2 , Issue.1 , pp. 39-46
    • Chandra, S.1    Khan, R.A.2
  • 9
    • 77953158482 scopus 로고    scopus 로고
    • U.S. National Institute of Standards and Technology, NISTIR 7564, Apr.
    • W. Jansen, "Directions in security metrics research," U.S. National Institute of Standards and Technology, NISTIR 7564, Apr. 2009, 21 p.
    • (2009) Directions in Security Metrics Research , pp. 21
    • Jansen, W.1
  • 10
  • 14
    • 78649248918 scopus 로고    scopus 로고
    • Version 1.0. Available July 4
    • European Privacy Seal, "EuroPriSe criteria," Version 1.0. Available: www.european-privacy-seal.eu. [July 4, 2010].
    • (2010) EuroPriSe Criteria
  • 15
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression," Technical Report, CMU, SRI, 1998.
    • (1998) Technical Report, CMU, SRI
    • Samarati, P.1    Sweeney, L.2
  • 17
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • Feb.
    • J. Reagle and L. F. Cranor, "The platform for privacy preferences," Communications of the ACM, 42(2), pp. 48-55, Feb. 1997.
    • (1997) Communications of the ACM , vol.42 , Issue.2 , pp. 48-55
    • Reagle, J.1    Cranor, L.F.2
  • 18
    • 78649237057 scopus 로고    scopus 로고
    • Privacy metrics and boundaries
    • Erasmus Research Institute of Management (ERIM)
    • L.-F. Pau, "Privacy metrics and boundaries," Research Paper ERS-2005-013-LIS, Erasmus Research Institute of Management (ERIM).
    • Research Paper ERS-2005-013-LIS
    • Pau, L.-F.1
  • 19
    • 77954051808 scopus 로고    scopus 로고
    • U.S. National Institute of Standards and Technology, Information Technology Laboratory. Version 15, 7 Oct.
    • P. Mell and T. Grance, "The NIST definition of cloud computing," U.S. National Institute of Standards and Technology, Information Technology Laboratory. Version 15, 7 Oct. 2009.
    • (2009) The NIST Definition of Cloud Computing
    • Mell, P.1    Grance, T.2
  • 20
    • 78649543654 scopus 로고    scopus 로고
    • Cloud computing: An auditor's perspective
    • S. Gadia, "Cloud computing: an auditor's perspective," ISACA Journal, Vol. 6, 2009.
    • (2009) ISACA Journal , vol.6
    • Gadia, S.1
  • 22
    • 77950567715 scopus 로고    scopus 로고
    • Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
    • Feb. 23
    • R. Gellman, "Privacy in the clouds: risks to privacy and confidentiality from cloud computing," World Privacy Forum (WPF) Report, Feb. 23, 2009.
    • (2009) World Privacy Forum (WPF) Report
    • Gellman, R.1
  • 23
    • 77954695824 scopus 로고    scopus 로고
    • Version 1.0. Downloaded from July 4
    • Cloud Security Alliance, "Top threats to cloud computing", Version 1.0. Downloaded from: www.cloudsecurityalliance.org [July 4, 2010].
    • (2010) Top Threats to Cloud Computing
  • 26
    • 78149392139 scopus 로고    scopus 로고
    • On the feasibility of utilizing security metrics in software-intensive systems
    • Jan.
    • R. Savola, "On the feasibility of utilizing security metrics in software-intensive systems," International Journal of Computer Science and Network Security, Vol. 10, No. 1, Jan. 2010, pp. 230-239.
    • (2010) International Journal of Computer Science and Network Security , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.