-
1
-
-
85055423182
-
Business continuity challenges in cloud computing
-
S. Ristov, M. Gusev, M. Kostoska, and K. Kiroski, "Business continuity challenges in cloud computing," in ICT Innovations 2011, Web Proceedings, Skopje, Macedonia, 2011.
-
(2011)
ICT Innovations 2011, Web Proceedings, Skopje, Macedonia
-
-
Ristov, S.1
Gusev, M.2
Kostoska, M.3
Kiroski, K.4
-
3
-
-
85088777056
-
Toward risk assessment as a service in cloud environments
-
B. S. Kaliski, JR. and W. Pauley, "Toward risk assessment as a service in cloud environments," in Proc. of the 2nd conf. HotCloud'10. USENIX Ass., USA, 2010, pp. 13-13.
-
Proc. of the 2nd Conf. HotCloud'10. USENIX Ass., USA, 2010
, pp. 13-13
-
-
Kaliski Jr., B.S.1
Pauley, W.2
-
4
-
-
84865066721
-
-
Sep. v1.0. [Online]. Available
-
(2011, Sep.) CSA security as a service v1.0. [Online]. Available: https://cloudsecurityalliance.org/research/working-groups/secaas/
-
(2011)
CSA Security As a Service
-
-
-
5
-
-
84865072707
-
-
Sep. Available
-
(2011, Sep.) NIST SP800-53 revision 3. [Online]. Available: http://csrc.nist.gov/publications/PubsSPs.html
-
(2011)
NIST SP800-53 Revision 3. [Online]
-
-
-
11
-
-
77954481802
-
-
ISO/IEC 27005: Available
-
ISO/IEC 27005:2011, Information Security Risk Management. [Online]. Available: http://www.iso.org/iso/iso-catalogue/catalogue-tc/catalogue-detail. htm?csnumber=56742
-
(2011)
Information Security Risk Management. [Online]
-
-
-
12
-
-
84865101231
-
-
Sep. [Online] Available
-
(2011, Sep.) ISACA cobit 4.1. [Online]. Available: http://www.isaca.org/ Knowledge-Center/COBIT/Pages/Overview.aspx
-
(2011)
ISACA Cobit
, vol.4
, Issue.1
-
-
-
13
-
-
84865102659
-
-
Sep. [Online]. Available
-
(2011, Sep.) AICPA SSAE 16. [Online]. Available: http://www.aicpa.org/ Research/Standards/AuditAttest/Pages/SSAE.aspx
-
(2011)
AICPA SSAE
, vol.16
-
-
-
14
-
-
84865066723
-
-
Sep. Available
-
(2011, Sep.) HIPAA. [Online]. Available: https://www.cms.gov/ HIPAAGenInfo/
-
(2011)
HIPAA. [Online]
-
-
-
15
-
-
84865072712
-
-
Sep. PCI DSS v2.0. [Online]. Available
-
(2011, Sep.) PCI DSS v2.0. [Online]. Available: https://www. pcisecuritystandards.org/security-standards/
-
(2011)
-
-
-
17
-
-
78649245892
-
-
Available
-
D. Catteddu and G. Hogben. (2009) Cloud computing risk assessment. [Online]. Available: http://www.enisa.europa.eu/publications/position-papers/ position-papers-at-enisa/act/rm/files/deliverables/cloud-computing-risk- assessment
-
(2009)
Cloud Computing Risk Assessment. [Online]
-
-
Catteddu, D.1
Hogben, G.2
-
21
-
-
84865101218
-
-
Sep. v1.2. [Online]. Available
-
(2011, Sep.) CSA cloud security alliance cloud controls matrix (CCM), v1.2. [Online]. Available: https://cloudsecurityalliance.org/research/ initiatives/cloud-controls-matrix/
-
(2011)
CSA Cloud Security Alliance Cloud Controls Matrix (CCM)
-
-
-
23
-
-
79955868669
-
Trustworthy clouds underpinning the future internet
-
J. D. et al, Ed. Springer-Verlag, Berlin, Heidelberg
-
R. Glott, E. Husmann, A. Sadeghi, and M. Schunter, "Trustworthy clouds underpinning the future internet," in The future internet, J. D. et al, Ed. Springer-Verlag, Berlin, Heidelberg, pp. 209-221.
-
The Future Internet
, pp. 209-221
-
-
Glott, R.1
Husmann, E.2
Sadeghi, A.3
Schunter, M.4
-
24
-
-
84865101225
-
Emerging security challenges of cloud virtual infrastructure
-
A. S. Ibrahim, J. Hamlyn-Harris, and J. Grundy, "Emerging security challenges of cloud virtual infrastructure," in Proc. of the Asia Pacific Cloud Workshop 2010 (co-located with APSEC2010), Sydney, 2010.
-
(2010)
Proc. of the Asia Pacific Cloud Workshop 2010 (Co-located with APSEC2010), Sydney
-
-
Ibrahim, A.S.1
Hamlyn-Harris, J.2
Grundy, J.3
-
27
-
-
85080549077
-
Secure cloud computing with a virtualized network infrastructure
-
F. Hao, T. V. Lakshman, S. Mukherjee, and H. Song, "Secure cloud computing with a virtualized network infrastructure," in Proc. of the 2nd conf. HotCloud'10. USENIX Ass., USA, 2010, pp. 16-16.
-
Proc. of the 2nd Conf. HotCloud'10. USENIX Ass., USA, 2010
, pp. 16-16
-
-
Hao, F.1
Lakshman, T.V.2
Mukherjee, S.3
Song, H.4
-
28
-
-
81055155507
-
Cloudsec: A security monitoring appliance for virtual machines in the iaas cloud model
-
A. S. Ibrahim, J. Hamlyn-Harris, J. Grundy, and M. Almorsy, "Cloudsec: A security monitoring appliance for virtual machines in the iaas cloud model," in Proceedings of 5th International Conference on Network and System Security (NSS 2011), Milan, Italy, 2011.
-
(2011)
Proceedings of 5th International Conference on Network and System Security (NSS 2011), Milan, Italy
-
-
Ibrahim, A.S.1
Hamlyn-Harris, J.2
Grundy, J.3
Almorsy, M.4
-
29
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. B. D. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE J. of Security & Privacy, vol. 8, no. 6, pp. 24-31, 2010.
-
(2010)
IEEE J. of Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.3
-
30
-
-
77956356055
-
Trusted cloud computing with secure resources and data coloring
-
K. Hwang and D. Li, "Trusted cloud computing with secure resources and data coloring," IEEE Internet Computing, pp. 14-22, 2010.
-
(2010)
IEEE Internet Computing
, pp. 14-22
-
-
Hwang, K.1
Li, D.2
|