메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1484-1489

A new methodology for security evaluation in cloud computing

Author keywords

Information Security Management; Security Assessment; Security Standards; Virtualization

Indexed keywords

BUSINESS CONTINUITY; CLOUD SERVICES; CLOUD SYSTEMS; COMPUTING SECURITY; CONTROL OBJECTIVES; CUSTOMER SERVICES; DATA OUTSOURCING; INDUSTRIAL STANDARDS; INFORMATION SECURITY MANAGEMENTS; NEW SOLUTIONS; QUANTITATIVE METRIC; SECURITY ASSESSMENT; SECURITY EVALUATION; SECURITY RISKS; SECURITY STANDARDS; VIRTUALIZATIONS;

EID: 84865104045     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (30)
  • 4
    • 84865066721 scopus 로고    scopus 로고
    • Sep. v1.0. [Online]. Available
    • (2011, Sep.) CSA security as a service v1.0. [Online]. Available: https://cloudsecurityalliance.org/research/working-groups/secaas/
    • (2011) CSA Security As a Service
  • 5
    • 84865072707 scopus 로고    scopus 로고
    • Sep. Available
    • (2011, Sep.) NIST SP800-53 revision 3. [Online]. Available: http://csrc.nist.gov/publications/PubsSPs.html
    • (2011) NIST SP800-53 Revision 3. [Online]
  • 11
    • 77954481802 scopus 로고    scopus 로고
    • ISO/IEC 27005: Available
    • ISO/IEC 27005:2011, Information Security Risk Management. [Online]. Available: http://www.iso.org/iso/iso-catalogue/catalogue-tc/catalogue-detail. htm?csnumber=56742
    • (2011) Information Security Risk Management. [Online]
  • 12
    • 84865101231 scopus 로고    scopus 로고
    • Sep. [Online] Available
    • (2011, Sep.) ISACA cobit 4.1. [Online]. Available: http://www.isaca.org/ Knowledge-Center/COBIT/Pages/Overview.aspx
    • (2011) ISACA Cobit , vol.4 , Issue.1
  • 13
    • 84865102659 scopus 로고    scopus 로고
    • Sep. [Online]. Available
    • (2011, Sep.) AICPA SSAE 16. [Online]. Available: http://www.aicpa.org/ Research/Standards/AuditAttest/Pages/SSAE.aspx
    • (2011) AICPA SSAE , vol.16
  • 14
    • 84865066723 scopus 로고    scopus 로고
    • Sep. Available
    • (2011, Sep.) HIPAA. [Online]. Available: https://www.cms.gov/ HIPAAGenInfo/
    • (2011) HIPAA. [Online]
  • 15
    • 84865072712 scopus 로고    scopus 로고
    • Sep. PCI DSS v2.0. [Online]. Available
    • (2011, Sep.) PCI DSS v2.0. [Online]. Available: https://www. pcisecuritystandards.org/security-standards/
    • (2011)
  • 17
    • 78649245892 scopus 로고    scopus 로고
    • Available
    • D. Catteddu and G. Hogben. (2009) Cloud computing risk assessment. [Online]. Available: http://www.enisa.europa.eu/publications/position-papers/ position-papers-at-enisa/act/rm/files/deliverables/cloud-computing-risk- assessment
    • (2009) Cloud Computing Risk Assessment. [Online]
    • Catteddu, D.1    Hogben, G.2
  • 21
    • 84865101218 scopus 로고    scopus 로고
    • Sep. v1.2. [Online]. Available
    • (2011, Sep.) CSA cloud security alliance cloud controls matrix (CCM), v1.2. [Online]. Available: https://cloudsecurityalliance.org/research/ initiatives/cloud-controls-matrix/
    • (2011) CSA Cloud Security Alliance Cloud Controls Matrix (CCM)
  • 23
    • 79955868669 scopus 로고    scopus 로고
    • Trustworthy clouds underpinning the future internet
    • J. D. et al, Ed. Springer-Verlag, Berlin, Heidelberg
    • R. Glott, E. Husmann, A. Sadeghi, and M. Schunter, "Trustworthy clouds underpinning the future internet," in The future internet, J. D. et al, Ed. Springer-Verlag, Berlin, Heidelberg, pp. 209-221.
    • The Future Internet , pp. 209-221
    • Glott, R.1    Husmann, E.2    Sadeghi, A.3    Schunter, M.4
  • 29
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • H. Takabi, J. B. D. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE J. of Security & Privacy, vol. 8, no. 6, pp. 24-31, 2010.
    • (2010) IEEE J. of Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.3
  • 30
    • 77956356055 scopus 로고    scopus 로고
    • Trusted cloud computing with secure resources and data coloring
    • K. Hwang and D. Li, "Trusted cloud computing with secure resources and data coloring," IEEE Internet Computing, pp. 14-22, 2010.
    • (2010) IEEE Internet Computing , pp. 14-22
    • Hwang, K.1    Li, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.