메뉴 건너뛰기




Volumn 148 LNBIP, Issue , 2013, Pages 455-465

Privacy in the cloud: Bridging the gap between design and implementation

Author keywords

Cloud Computing; CSA; Implementation Techniques; PETs; privacy concepts; Software Engineering

Indexed keywords

CLOUD COMPUTING; COMPUTER PRIVACY; INFORMATION SYSTEMS; SOFTWARE ENGINEERING; SYSTEMS ENGINEERING;

EID: 84879869482     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-38490-5_41     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 1
    • 84872869891 scopus 로고    scopus 로고
    • V1.0, retrieved September 22, 2012
    • Cloud Security Alliance, Top Threats to Cloud Computing V1.0, https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf (retrieved September 22, 2012)
    • Top Threats to Cloud Computing
  • 3
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1-11 (2010)
    • (2010) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 7
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requirements Engineering 13(3), 241-255 (2008)
    • (2008) Requirements Engineering , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 13
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT) - Testing the security of information systems at design time
    • Mouratidis, Giorgini, P.: Security Attack Testing (SAT) - testing the security of information systems at design time. Inf. Syst. 32(8), 1166-1183 (2007)
    • (2007) Inf. Syst. , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis1    Giorgini, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.