메뉴 건너뛰기




Volumn , Issue , 2010, Pages 199-208

Risk-based confidentiality requirements specification for outsourced IT systems

Author keywords

Confidentiality requirements; Outsourcing; Risk assessment; Service level agreements

Indexed keywords

CONFIDENTIALITY REQUIREMENTS; IN-CONTROL; IT ASSETS; IT AUDIT; IT OUTSOURCING; IT SYSTEM; PRACTICAL METHOD; REQUIREMENTS SPECIFICATIONS; RESPONSE TIME; RISK-BASED; SERVICE LEVEL AGREEMENTS;

EID: 78650365319     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RE.2010.30     Document Type: Conference Paper
Times cited : (18)

References (27)
  • 3
    • 84982790262 scopus 로고    scopus 로고
    • Distinguishing action research from participative case studies
    • March
    • R. Baskerville. Distinguishing action research from participative case studies. J. of Syst. and Info. Techn., 1(1):25-45, March 1997.
    • (1997) J. of Syst. and Info. Techn. , vol.1 , Issue.1 , pp. 25-45
    • Baskerville, R.1
  • 5
    • 78650382212 scopus 로고    scopus 로고
    • British Government's Central Computer and Telecommunications Agency
    • British Government's Central Computer and Telecommunications Agency. CRAMM: Risk Analysis and Management methodology, 2008.
    • (2008) CRAMM: Risk Analysis and Management Methodology
  • 6
    • 0003765587 scopus 로고    scopus 로고
    • ISO 15408, Version 3.1, Revision 2, CCMB- 2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007
    • ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB- 2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007.
    • 2007 Common Criteria for Information Technology Security Evaluation
  • 8
    • 34347372090 scopus 로고    scopus 로고
    • A probabilistic model for optimal insurance contracts against security risks and privacy violation in it outsourcing environments
    • S. Gritzalis, A. Yannacopoulos, C. Lambrinoudakis, P. Hatzopoulos, and S.K.Katsikas. A probabilistic model for optimal insurance contracts against security risks and privacy violation in it outsourcing environments. Int. Journal of Information Security, 6(4):197-211, 2007.
    • (2007) Int. Journal of Information Security , vol.6 , Issue.4 , pp. 197-211
    • Gritzalis, S.1    Yannacopoulos, A.2    Lambrinoudakis, C.3    Hatzopoulos, P.4    Katsikas, S.K.5
  • 9
    • 32044457421 scopus 로고    scopus 로고
    • Using trust assumptions with security requirements
    • B. Haley, C. Laney, D. Moffett, and B. Nuseibeh. Using trust assumptions with security requirements. Requir. Eng., 11(2):138-151, 2006.
    • (2006) Requir. Eng. , vol.11 , Issue.2 , pp. 138-151
    • Haley, B.1    Laney, C.2    Moffett, D.3    Nuseibeh, B.4
  • 10
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • C. Haley, R. Laney, J. Moffett, and B. Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng., 34(1):133-153, 2008.
    • (2008) IEEE Trans. Softw. Eng. , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 11
    • 49249117338 scopus 로고    scopus 로고
    • Managing risk propagation in extended enterprise networks
    • C. Huang, R. Behara, and Q. Hu. Managing Risk Propagation in Extended Enterprise Networks. IT Professional, 10(4):14-19, 2008.
    • (2008) IT Professional , vol.10 , Issue.4 , pp. 14-19
    • Huang, C.1    Behara, R.2    Hu, Q.3
  • 12
    • 59049093084 scopus 로고    scopus 로고
    • Rescuing it outsourcing: Strategic use of service-level agreements
    • C. Huang and J. Goo. Rescuing IT Outsourcing: Strategic Use of Service-Level Agreements. IT Prof., 11(1):50-58, 2009.
    • (2009) IT Prof. , vol.11 , Issue.1 , pp. 50-58
    • Huang, C.1    Goo, J.2
  • 14
    • 34250776507 scopus 로고    scopus 로고
    • Security and trust in it business outsourcing: A manifesto
    • Proc. of the 2nd Int. Workshop on Security and Trust Management (STM 2006)
    • Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, and A. Yautsiukhin. Security and trust in it business outsourcing: a manifesto. Electronic Notes in Theoretical Computer Science, 179:47 - 58, 2007. Proc. of the 2nd Int. Workshop on Security and Trust Management (STM 2006).
    • (2007) Electronic Notes in Theoretical Computer Science , vol.179 , pp. 47-58
    • Karabulut, Y.1    Kerschbaum, F.2    Massacci, F.3    Robinson, P.4    Yautsiukhin, A.5
  • 15
    • 4344688863 scopus 로고    scopus 로고
    • Learning to contract: Evidence from the personal computer industry
    • K. Mayer and N. Argyres. Learning to Contract: Evidence from the Personal Computer Industry. Organization Science, 15(4):394-410, 2004.
    • (2004) Organization Science , vol.15 , Issue.4 , pp. 394-410
    • Mayer, K.1    Argyres, N.2
  • 16
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria based security requirements engineering process for the development of secure information systems
    • D. Mellado, E. Fernańdez-Medina, and M. Piattini. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces, 29(2):244-253, 2007.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 244-253
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 21
    • 0036684519 scopus 로고    scopus 로고
    • Do formal contracts and relational governance function as substitutes or complements?
    • L. Poppo and T. Zenger. Do formal contracts and relational governance function as substitutes or complements? Strategic Management J., 23:707-725, 2002.
    • (2002) Strategic Management J. , vol.23 , pp. 707-725
    • Poppo, L.1    Zenger, T.2
  • 22
    • 17444417128 scopus 로고    scopus 로고
    • Averting security missteps in outsourcing
    • E. Power and R. Trope. Averting security missteps in outsourcing. IEEE Security and Privacy, 3(2):70-73, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 70-73
    • Power, E.1    Trope, R.2
  • 23
    • 0011785265 scopus 로고    scopus 로고
    • The role of trust in outsourced is development projects
    • R. Sabherwal. The role of trust in outsourced is development projects. Commun. ACM, 42(2):80-86, 1999.
    • (1999) Commun ACM , vol.42 , Issue.2 , pp. 80-86
    • Sabherwal, R.1
  • 27
    • 31044444123 scopus 로고    scopus 로고
    • Requirements engineering paper classification and evaluation criteria: A proposal and a discussion
    • R. Wieringa, N. Maiden, N. Mead, and C. Rolland. Requirements engineering paper classification and evaluation criteria: A proposal and a discussion. J. Req. Eng., 11(1):102-107, 2006.
    • (2006) J. Req. Eng. , vol.11 , Issue.1 , pp. 102-107
    • Wieringa, R.1    Maiden, N.2    Mead, N.3    Rolland, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.