메뉴 건너뛰기




Volumn 35, Issue 1, 2013, Pages 1-5

Data security services, solutions and standards for outsourcing

Author keywords

Access control; Identity management; Inference control; Mobile code security; Web services

Indexed keywords

BUSINESS RELATIONSHIPS; DATA OUTSOURCING; FOREIGN COUNTRIES; IDENTITY MANAGEMENT; INDIVIDUAL COMPONENTS; INFERENCE CONTROL; MOBILE CODE SECURITY; MULTIPLE ORGANIZATIONS; PRODUCT QUALITY; SECURITY ISSUES; SECURITY SERVICES; SECURITY VULNERABILITIES; SOFTWARE-AS-A-SERVICE; SUPPLY CHAIN SECURITY;

EID: 84867870635     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2012.02.001     Document Type: Article
Times cited : (26)

References (20)
  • 2
    • 70349967661 scopus 로고    scopus 로고
    • X as a service, cloud computing, and the need for good judgment
    • H.E. Schaffer X as a service, cloud computing, and the need for good judgment IT Professional 11 5 2009 4 5
    • (2009) IT Professional , vol.11 , Issue.5 , pp. 4-5
    • Schaffer, H.E.1
  • 6
    • 84867851862 scopus 로고    scopus 로고
    • Software & information industry association: Software as a service: Strategic backgrounder
    • Software & information industry association: software as a service: strategic backgrounder Whitepaper February 31 2001
    • (2001) Whitepaper
  • 7
    • 26444442384 scopus 로고    scopus 로고
    • Security issues in querying encrypted data
    • Murat Kantarcioglu, and Chris Clifton Security issues in querying encrypted data Proc. DBSec 2005 325 337
    • (2005) Proc. DBSec , pp. 325-337
    • Kantarcioglu, M.1    Clifton, C.2
  • 8
    • 84967222929 scopus 로고    scopus 로고
    • Ensuring the integrity of encrypted databases in the database-as-a- service model
    • Hakan Hacigümüs, Balakrishna R. Iyer, and Sharad Mehrotra Ensuring the integrity of encrypted databases in the database-as-a-service model Proc. DBSec 2003 61 74
    • (2003) Proc. DBSec , pp. 61-74
    • Hacigümüs, H.1    Iyer, B.R.2    Mehrotra, S.3
  • 16
    • 85072967179 scopus 로고    scopus 로고
    • Data supply chain management: Supply chain management for incentive and risk-based assured information sharing
    • B. Thuraisingham Data supply chain management: supply chain management for incentive and risk-based assured information sharing UTD Technical Report 2010
    • (2010) UTD Technical Report
    • Thuraisingham, B.1
  • 17
    • 84867868972 scopus 로고    scopus 로고
    • Using agency theory to guide the design of incentives
    • Priscilla R. Manatsa, Tim S. McLaren, and Information Sharing In a Supply Chain Using agency theory to guide the design of incentives Supply Chain Forum 9 1 2008
    • (2008) Supply Chain Forum , vol.9 , Issue.1
    • Manatsa, P.R.1    McLaren, T.S.2
  • 19
    • 84867871393 scopus 로고    scopus 로고
    • Security standards for outsourcing
    • Carter Santos Security standards for outsourcing Law Technology News May 2009
    • (2009) Law Technology News
    • Santos, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.