메뉴 건너뛰기




Volumn 86, Issue 9, 2013, Pages 2276-2293

A framework to support selection of cloud providers based on security and privacy requirements

Author keywords

Cloud computing; Privacy; Secure; software engineering

Indexed keywords

CLOUD SERVICE PROVIDERS; ENGINEERING TECHNIQUES; ON-DEMAND SERVICES; REGULATORY VIOLATIONS; SECURE; SECURITY AND PRIVACY; STRUCTURED APPROACH; STRUCTURED PROCESS;

EID: 84881474672     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2013.03.011     Document Type: Article
Times cited : (102)

References (53)
  • 4
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulator rules for privacy and security requirements
    • JAN-FEB
    • T.D. Breaux, and A.I. Antón Analyzing regulator rules for privacy and security requirements IEEE Transactions on Software Engineering 34 1 (Jan-Feb) 2008
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1
    • Breaux, T.D.1    Antón, A.I.2
  • 5
    • 82455221304 scopus 로고    scopus 로고
    • A cloud you can trust - How to ensure that cloud computing's problems - Data breaches, leaks, service outages - Don't obscure its virtues
    • 2011 December
    • C. Cachin, and M. Schunter A cloud you can trust - how to ensure that cloud computing's problems - data breaches, leaks, service outages - don't obscure its virtues IEEE Spektrum 2011 December 2011 28 51
    • (2011) IEEE Spektrum , pp. 28-51
    • Cachin, C.1    Schunter, M.2
  • 7
    • 84878092082 scopus 로고    scopus 로고
    • Cloud computing: Challenges and future directions, trends & issues in crime and criminal justice
    • K.R. Choo Cloud computing: challenges and future directions, trends & issues in crime and criminal justice Australian Institute of Criminology 400 2010
    • (2010) Australian Institute of Criminology , vol.400
    • Choo, K.R.1
  • 9
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requirements Engineering Journal 16 1 2011 3 32
    • (2011) Requirements Engineering Journal , vol.16 , Issue.1 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 11
    • 63049096381 scopus 로고    scopus 로고
    • Cloud computing: Does nirvana hide behind the nebula?
    • H. Erdogmus Cloud computing: does nirvana hide behind the nebula? IEEE Software 26 2 2009 4 6
    • (2009) IEEE Software , vol.26 , Issue.2 , pp. 4-6
    • Erdogmus, H.1
  • 17
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
    • of Lecture Notes in Computer Science, Springer
    • P. Giorgini, F. Massacci, and J. Mylopoulos Requirement engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard 22nd International Conference On Conceptual Modeling (ER 2003) vol. 2813 of Lecture Notes in Computer Science, Springer 2003 263 276
    • (2003) 22nd International Conference on Conceptual Modeling (ER 2003) , vol.2813 , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 21
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
    • MAR
    • S.H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec Requirements Engineering Journal 15 1 (Mar) 2010 63 93
    • (2010) Requirements Engineering Journal , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5
  • 23
    • 77955462130 scopus 로고    scopus 로고
    • Toward a framework to elicit and manage security and privacy requirements from laws and regulation
    • Lecture Notes in Computer Science, vol. 6182/2010
    • S. Islam, H. Mouratidis, and S. Wagner Toward a framework to elicit and manage security and privacy requirements from laws and regulation Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ) Lecture Notes in Computer Science, vol. 6182/2010 2010 255 261
    • (2010) Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ) , pp. 255-261
    • Islam, S.1    Mouratidis, H.2    Wagner, S.3
  • 24
  • 26
    • 84881476966 scopus 로고    scopus 로고
    • A goal-driven risk management approach to support security and privacy analysis of cloud-based system
    • IGI Global Publication United States of America by (an imprint of IGI Global) 701 E. Chocolate Avenue, Hershey, PA 17033
    • S. Islam, H. Mouratidis, and E. Weippl A goal-driven risk management approach to support security and privacy analysis of cloud-based system Security Engineering for Cloud Computing: Approaches and Tools 2012 IGI Global Publication United States of America by (an imprint of IGI Global) 701 E. Chocolate Avenue, Hershey, PA 17033
    • (2012) Security Engineering for Cloud Computing: Approaches and Tools
    • Islam, S.1    Mouratidis, H.2    Weippl, E.3
  • 36
    • 33751189883 scopus 로고    scopus 로고
    • Security quality requirements engineering (SQUARE) methodology
    • N.R. Mead, and T. Steheny Security quality requirements engineering (SQUARE) methodology SIGSOFT Software Engineering Notes 30 4 2005 1 7
    • (2005) SIGSOFT Software Engineering Notes , vol.30 , Issue.4 , pp. 1-7
    • Mead, N.R.1    Steheny, T.2
  • 37
    • 33751416458 scopus 로고    scopus 로고
    • A common criterion based security requirements engineering process for the development of secure information system
    • D. Mellado, E. Fernández-Medina, and M. Piattini A common criterion based security requirements engineering process for the development of secure information system Computer Standard and Interfaces 29 2007 244 253
    • (2007) Computer Standard and Interfaces , vol.29 , pp. 244-253
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 41
    • 79952367895 scopus 로고    scopus 로고
    • Privacy, Security and Trust Issues Arising from Cloud Computing
    • IEEE Computer Society PRISM UK
    • S. Pearson, and A. Benameur Privacy, Security and Trust Issues Arising from Cloud Computing 2nd IEEE International Conference on Cloud Computing Technology and Science IEEE Computer Society 2010 PRISM UK 693 702 http://www.prismworld.org/en/what-is-prism/what-does-it-deliver
    • (2010) 2nd IEEE International Conference on Cloud Computing Technology and Science , pp. 693-702
    • Pearson, S.1    Benameur, A.2
  • 46
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering Journal 10 1 2005 34 44
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 48
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • November/December, IEEE Computer Society
    • H. Takabi, J. Joshi, and G. Ahn Security and privacy challenges in cloud computing environments IEEE Computer And Reliability Societies November/December, IEEE Computer Society 2010
    • (2010) IEEE Computer and Reliability Societies
    • Takabi, H.1    Joshi, J.2    Ahn, G.3
  • 49
    • 79952065844 scopus 로고    scopus 로고
    • Cloud Threat Cloud Security Alliance
    • Cloud Threat. 2010. Top Threats to Cloud Computing Vr. 1.0, Cloud Security Alliance, https://cloudsecurityalliance.org/research/top-threats/.
    • (2010) Top Threats to Cloud Computing Vr. 1.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.