-
1
-
-
67649668578
-
Frontiers in information and software as services
-
IEEE CS Press
-
K. S. Candan et al., "Frontiers in Information and Software as Services, " Proc. 2009 IEEE Conf. Data Eng., IEEE CS Press, 2009, pp. 1761-1768.
-
(2009)
Proc. 2009 IEEE Conf. Data Eng.
, pp. 1761-1768
-
-
Candan, K.S.1
-
2
-
-
77954051808
-
-
Nat'l Inst. of Standards and Technology Computer Security Division, 7 Oct
-
P. Mell and T. Grance, "The NIST Defnition of Cloud Computing, " Nat'l Inst. of Standards and Technology Computer Security Division, 7 Oct. 2009; http://csrc. nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc.
-
(2009)
The NIST Defnition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
3
-
-
39749187733
-
An empirical exploration of how process standardization reduces outsourcing risk
-
IEEE CS Press
-
K. Wüllenweber and T. Weitzel, "An Empirical Exploration of How Process Standardization Reduces Outsourcing Risk, " Proc. 40th Ann. Hawaii Int'l Conf. System Science, IEEE CS Press, 2007, p. 240c.
-
(2007)
Proc. 40th Ann. Hawaii Int'l Conf. System Science
-
-
Wüllenweber, K.1
Weitzel, T.2
-
5
-
-
78649245892
-
-
European Network and Information Security Agency, 20 Nov
-
"Cloud Computing Security Risk Assessment, " European Network and Information Security Agency, 20 Nov. 2009; www.enisa.europa.eu/act/rm/fles/ deliverables/cloud-computing-risk-assessment.
-
(2009)
Cloud Computing Security Risk Assessment
-
-
-
6
-
-
85001875341
-
Do privacy statements really work? The efect of privacy statements and fair information practices on trust and perceived risk in E-commerce
-
H. R. Nemati and T. Van Dyke, "Do Privacy Statements Really Work? The Efect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce, " Int'l J. Information Security and Privacy, vol. 3, no. 1, 2009, pp. 45-65.
-
(2009)
Int'l J. Information Security and Privacy
, vol.3
, Issue.1
, pp. 45-65
-
-
Nemati, H.R.1
Van Dyke, T.2
-
7
-
-
78650046325
-
-
Privacy Rights Clearinghouse, 2 Mar
-
"Chronology of Data Breaches, " Privacy Rights Clearinghouse, 2 Mar. 2010; www.privacyrights.org/ar/ChronDataBreaches.htm.
-
(2010)
Chronology of Data Breaches
-
-
-
10
-
-
33947519817
-
-
Small Business Administration Ofce of Advocacy, Sept
-
"Frequently Asked Questions, " Small Business Administration Ofce of Advocacy, Sept. 2009; www.sba.gov/advo/stats/sbfaq.pdf.
-
(2009)
Frequently Asked Questions
-
-
-
15
-
-
84875552351
-
-
Information Systems Audit and Control Association
-
"COBIT Framework for IT Governance and Control, " Information Systems Audit and Control Association, 2007; www.isaca.org/Knowledge-Center/ COBIT/Pages/Overview.aspx.
-
(2007)
COBIT Framework for IT Governance and Control
-
-
-
16
-
-
78650047183
-
ISO/IEC 27000:2009: Information technology, security techniques, information security management systems, overview and vocabulary
-
ISO/IEC 27000:2009: Information Technology, Security Techniques, Information Security Management Systems, Overview and Vocabulary, Int'l Org. for Standardization and the Int'l Electrotechnical Commission, 2009; www.iso.org/iso/iso-catalogue/catalogue-tc/catalogue-detail.htm? csnumber=41933.
-
(2009)
Int'l Org. for Standardization and the Int'l Electrotechnical Commission
-
-
-
18
-
-
78650068208
-
-
Amazon Web Services, "
-
"AWS Completes SAS70 Type II Audit, " Amazon Web Services, " 2010; http://aws.amazon.com/about-aws/whats-new/2009/11/11/aws-completes- sas70-type-ii-audit.
-
(2010)
AWS Completes SAS70 Type II Audit
-
-
-
20
-
-
78650052290
-
Microsoft's sidekick cloud outage gets worse
-
11 Oct
-
M. W. Jones, "Microsoft's Sidekick Cloud Outage Gets Worse, " Tech. Blorge, 11 Oct. 2009; http://tech.blorge.com/Structure:%20/2009/10/11/ microsofts-sidekick-cloud-outage-gets-worse.
-
(2009)
Tech. Blorge
-
-
Jones, M.W.1
|