-
1
-
-
77950347409
-
Above the clouds: A berkeley view of cloud computing
-
M. Armbrust, A. Fox, R. Grifïth, A.D. Joseph, R. Katz, A. Konwinsk, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia Above the clouds: a berkeley view of cloud computing Communications of the ACM 53 4 2010 50 58
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Grifïth, R.3
Joseph, A.D.4
Katz, R.5
Konwinsk, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
40449096076
-
Analyzing regulator rules for privacy and security requirements
-
JAN-FEB
-
T.D. Breaux, and A.I. Antón Analyzing regulator rules for privacy and security requirements IEEE Transactions on Software Engineering 34 1 (Jan-Feb) 2008
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
-
-
Breaux, T.D.1
Antón, A.I.2
-
5
-
-
82455221304
-
A cloud you can trust - How to ensure that cloud computing's problems - Data breaches, leaks, service outages - Don't obscure its virtues
-
2011 December
-
C. Cachin, and M. Schunter A cloud you can trust - how to ensure that cloud computing's problems - data breaches, leaks, service outages - don't obscure its virtues IEEE Spektrum 2011 December 2011 28 51
-
(2011)
IEEE Spektrum
, pp. 28-51
-
-
Cachin, C.1
Schunter, M.2
-
6
-
-
77954327465
-
What's new about cloud computing security
-
Chen, Y.; Paxson, V.; Katz, R.H.; 2010. What's new about cloud computing security, technical report, Dept.; Univ. of California, www.eecs.berkeley.edu/ Pubs/TechRpts/2010/EECS-2010-5.html.
-
(2010)
Technical Report, Dept.; Univ. of California
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
7
-
-
84878092082
-
Cloud computing: Challenges and future directions, trends & issues in crime and criminal justice
-
K.R. Choo Cloud computing: challenges and future directions, trends & issues in crime and criminal justice Australian Institute of Criminology 400 2010
-
(2010)
Australian Institute of Criminology
, vol.400
-
-
Choo, K.R.1
-
9
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requirements Engineering Journal 16 1 2011 3 32
-
(2011)
Requirements Engineering Journal
, vol.16
, Issue.1
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
11
-
-
63049096381
-
Cloud computing: Does nirvana hide behind the nebula?
-
H. Erdogmus Cloud computing: does nirvana hide behind the nebula? IEEE Software 26 2 2009 4 6
-
(2009)
IEEE Software
, vol.26
, Issue.2
, pp. 4-6
-
-
Erdogmus, H.1
-
14
-
-
84974691155
-
Reasoning with goal models
-
Tampere, Finland, October
-
P. Giorgini, J. Mylopoulos, E. Nicchiarelli, and R. Sebastiani Reasoning with goal models Proceedings of the 21st International Conference on Conceptual Modeling (ER) Tampere, Finland, October 2002
-
(2002)
Proceedings of the 21st International Conference on Conceptual Modeling (ER)
-
-
Giorgini, P.1
Mylopoulos, J.2
Nicchiarelli, E.3
Sebastiani, R.4
-
15
-
-
78649899214
-
The characteristics of cloud computing
-
Washington, DC, USA
-
C. Gong, J. Liu, Q. Zhang, H. Chen, and Z. Gong The characteristics of cloud computing Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, IEEE Computer Society Washington, DC, USA 2010
-
(2010)
Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, IEEE Computer Society
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
17
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
-
of Lecture Notes in Computer Science, Springer
-
P. Giorgini, F. Massacci, and J. Mylopoulos Requirement engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard 22nd International Conference On Conceptual Modeling (ER 2003) vol. 2813 of Lecture Notes in Computer Science, Springer 2003 263 276
-
(2003)
22nd International Conference on Conceptual Modeling (ER 2003)
, vol.2813
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
21
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
-
MAR
-
S.H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec Requirements Engineering Journal 15 1 (Mar) 2010 63 93
-
(2010)
Requirements Engineering Journal
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
23
-
-
77955462130
-
Toward a framework to elicit and manage security and privacy requirements from laws and regulation
-
Lecture Notes in Computer Science, vol. 6182/2010
-
S. Islam, H. Mouratidis, and S. Wagner Toward a framework to elicit and manage security and privacy requirements from laws and regulation Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ) Lecture Notes in Computer Science, vol. 6182/2010 2010 255 261
-
(2010)
Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ)
, pp. 255-261
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
-
25
-
-
84881008891
-
Model based process to support security and privacy requirements engineering
-
S. Islam, H. Mouratidis, C. Kalloniatis, A. Hudic, and L. Zechner Model based process to support security and privacy requirements engineering International Journal of Secure Software Engineering (IJSSE) 3 3 2012
-
(2012)
International Journal of Secure Software Engineering (IJSSE)
, vol.3
, Issue.3
-
-
Islam, S.1
Mouratidis, H.2
Kalloniatis, C.3
Hudic, A.4
Zechner, L.5
-
26
-
-
84881476966
-
A goal-driven risk management approach to support security and privacy analysis of cloud-based system
-
IGI Global Publication United States of America by (an imprint of IGI Global) 701 E. Chocolate Avenue, Hershey, PA 17033
-
S. Islam, H. Mouratidis, and E. Weippl A goal-driven risk management approach to support security and privacy analysis of cloud-based system Security Engineering for Cloud Computing: Approaches and Tools 2012 IGI Global Publication United States of America by (an imprint of IGI Global) 701 E. Chocolate Avenue, Hershey, PA 17033
-
(2012)
Security Engineering for Cloud Computing: Approaches and Tools
-
-
Islam, S.1
Mouratidis, H.2
Weippl, E.3
-
30
-
-
3543083613
-
A goal-based organizational perspective on multi-agent architectures
-
Seattle, USA
-
M. Kolp, P. Giorgini, and J. Mylopoulos A goal-based organizational perspective on multi-agent architectures Proceedings of the 8th International Workshop on Agent Theories, Architectures, and Languages (ATAL-2001) Seattle, USA 2001
-
(2001)
Proceedings of the 8th International Workshop on Agent Theories, Architectures, and Languages (ATAL-2001)
-
-
Kolp, M.1
Giorgini, P.2
Mylopoulos, J.3
-
36
-
-
33751189883
-
Security quality requirements engineering (SQUARE) methodology
-
N.R. Mead, and T. Steheny Security quality requirements engineering (SQUARE) methodology SIGSOFT Software Engineering Notes 30 4 2005 1 7
-
(2005)
SIGSOFT Software Engineering Notes
, vol.30
, Issue.4
, pp. 1-7
-
-
Mead, N.R.1
Steheny, T.2
-
37
-
-
33751416458
-
A common criterion based security requirements engineering process for the development of secure information system
-
D. Mellado, E. Fernández-Medina, and M. Piattini A common criterion based security requirements engineering process for the development of secure information system Computer Standard and Interfaces 29 2007 244 253
-
(2007)
Computer Standard and Interfaces
, vol.29
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
41
-
-
79952367895
-
Privacy, Security and Trust Issues Arising from Cloud Computing
-
IEEE Computer Society PRISM UK
-
S. Pearson, and A. Benameur Privacy, Security and Trust Issues Arising from Cloud Computing 2nd IEEE International Conference on Cloud Computing Technology and Science IEEE Computer Society 2010 PRISM UK 693 702 http://www.prismworld.org/en/what-is-prism/what-does-it-deliver
-
(2010)
2nd IEEE International Conference on Cloud Computing Technology and Science
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
42
-
-
77949490964
-
Analysis of secure mobile grid systems: A systematic approach
-
D.G. Rosado, E. Fernández-Medina, J. López, and M. Piattini Analysis of secure mobile grid systems: a systematic approach Information & Software Technology 52 5 2010 517 536
-
(2010)
Information & Software Technology
, vol.52
, Issue.5
, pp. 517-536
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
46
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering Journal 10 1 2005 34 44
-
(2005)
Requirements Engineering Journal
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
48
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
November/December, IEEE Computer Society
-
H. Takabi, J. Joshi, and G. Ahn Security and privacy challenges in cloud computing environments IEEE Computer And Reliability Societies November/December, IEEE Computer Society 2010
-
(2010)
IEEE Computer and Reliability Societies
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
49
-
-
79952065844
-
-
Cloud Threat Cloud Security Alliance
-
Cloud Threat. 2010. Top Threats to Cloud Computing Vr. 1.0, Cloud Security Alliance, https://cloudsecurityalliance.org/research/top-threats/.
-
(2010)
Top Threats to Cloud Computing Vr. 1.0
-
-
|