-
1
-
-
53949092999
-
Risk and risk management in software projects: A reassessment
-
doi:10.1016/j.jss.2008.03.059
-
Bannerman, P. L. (2008). Risk and risk management in software projects: A reassessment. Journal of Systems and Software, 81(12), 2118-2133. doi:10.1016/j.jss.2008.03.059
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.12
, pp. 2118-2133
-
-
Bannerman, P.L.1
-
2
-
-
0025791156
-
Software risk management: Principles and practices
-
doi:10.1109/52.62930
-
Barry, B. W. (1991). Software risk management: Principles and practices. IEEE Software, 8(1), 32-41. doi:10.1109/52.62930
-
(1991)
IEEE Software
, vol.8
, Issue.1
, pp. 32-41
-
-
Barry, B.W.1
-
4
-
-
85008047640
-
The competitive edge of risk entrepreneurs
-
doi:10.1109/6294.781627
-
Charette, R. N. (1999). The competitive edge of risk entrepreneurs. IT Professional, 1(4), 69-73. doi:10.1109/6294.781627
-
(1999)
IT Professional
, vol.1
, Issue.4
, pp. 69-73
-
-
Charette, R.N.1
-
5
-
-
77954327465
-
-
EECS Dept., University of California. Retrieved from
-
Chen, Y., Paxson, V., & Katz, R. H. (2010). What's new about cloud computing security? (Technical report UCB/EECS-2010-5). EECS Dept., University of California. Retrieved from www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
-
(2010)
What's New About Cloud Computing Security? (Technical Report UCB/EECS-2010-5)
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
7
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
doi:10.1145/1805974.1805978
-
Ciriani, V., Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., & Samarati, P. (2010). Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security, 13(3). doi:10.1145/1805974.1805978
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.3
-
-
Ciriani, V.1
Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
84898374975
-
-
Retrieved June 16, 2011, from
-
Dropbox. (2011). Retrieved June 16, 2011, from https://www.dropbox.com
-
(2011)
Dropbox
-
-
-
11
-
-
78649899214
-
The characteristics of cloud computing
-
Washington, DC: IEEE Computer Society, USA
-
Gong, C., Liu, J., Zhang, Q., Chen, H., & Gong, Z. (2010). The characteristics of cloud computing. Proceedings of the 2010 39th International Conference on Parallel Processing Workshops. Washington, DC: IEEE Computer Society, USA.
-
(2010)
Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
12
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
doi:10.1109/MSP.2010.115
-
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security & Privacy Magazine, 9(2), 50-57. doi:10.1109/MSP.2010.115
-
(2011)
IEEE Security & Privacy Magazine
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
19
-
-
84858990113
-
Towards a framework for offshore outsource software development risk management model
-
doi:10.4304/jsw.6.1.38-47
-
Islam, S., & Houmb, S. H. (2011a). Towards a framework for offshore outsource software development risk management model. Journal of Software, 6(1), 38-47. doi:10.4304/jsw.6.1.38-47
-
(2011)
Journal of Software
, vol.6
, Issue.1
, pp. 38-47
-
-
Islam, S.1
Houmb, S.H.2
-
20
-
-
79959729769
-
A framework to support alignment of secure software engineering with legal regulations
-
Islam, S., Mouratidis, H., & Jürjens, J. (2011b). A framework to support alignment of secure software engineering with legal regulations. Journal of Software and Systems Modelling (SoSyM) Theme Section on Non-Functional System Properties in Domain-Specific Modelling Languages, 10(3), 369-394.
-
(2011)
Journal of Software and Systems Modelling (SoSyM) Theme Section on Non-Functional System Properties in Domain-Specific Modelling Languages
, vol.10
, Issue.3
, pp. 369-394
-
-
Islam, S.1
Mouratidis, H.2
Jürjens, J.3
-
24
-
-
45849131284
-
Design of a modelling language for information system security risk management
-
Mayer, N., Heymans, P., & Matulevicius, R. (2007). Design of a modelling language for information system security risk management. In Proceedings of the 1st InternationalConference on Research Challenges in Information Science (RCIS 2007), (pp. 121-131).
-
(2007)
Proceedings of the 1st InternationalConference on Research Challenges in Information Science (RCIS 2007)
, pp. 121-131
-
-
Mayer, N.1
Heymans, P.2
Matulevicius, R.3
-
26
-
-
34548508691
-
Security attack testing (SAT) - Testing the security of information systems at design time
-
doi:10.1016/j.is.2007.03.002
-
Mouratidis, H., & Giorgini, P. (2007)Security attack testing (SAT) - Testing the security of information systems at design time. Information Systems, 32(8), 1166-1183. doi:10.1016/j.is.2007.03.002
-
(2007)
Information Systems
, vol.32
, Issue.8
, pp. 1166-1183
-
-
Mouratidis, H.1
Giorgini, P.2
-
28
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., & Weippl, E. (2011). Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. Proceedings of Usenix Security.
-
(2011)
Proceedings of Usenix Security
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
31
-
-
84898117566
-
-
SBA, Retrieved November 15, 2011, from
-
SBA. (2011). Secure Business Austria. Retrieved November 15, 2011, from http://www.sbaresearch.org/research/
-
(2011)
Secure Business Austria
-
-
-
32
-
-
27144463943
-
Model-based risk assessment in a component-based software engineering process -Using the CORAS approach to identify security risks
-
F. Barbier (Ed.), Kluwer Academic Publishers
-
Stolen, K., den Braber, F., Fredriksen, R., Gran, B. A., & Houmb, S. H., Stama-tiou Y. C., & Aagedal, J. Â. (2007). Model-based risk assessment in a component-based software engineering process -Using the CORAS approach to identify security risks. In F. Barbier (Ed.), Business componentbased software engineering. Kluwer Academic Publishers.
-
(2007)
Business Componentbased Software Engineering
-
-
Stolen, K.1
den Braber, F.2
Fredriksen, R.3
Gran, B.A.4
Houmb, S.H.5
Stama-Tiou, Y.C.6
Aagedal, J.Â.7
-
33
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
doi:10.1016/j.jnca.2010.07.006
-
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1). doi:10.1016/j.jnca.2010.07.006
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
-
-
Subashini, S.1
Kavitha, V.2
-
35
-
-
69349098776
-
Cloud computing and the common man
-
doi:10.1109/MC.2009.252
-
Viega, J. (2009). Cloud computing and the common man. Computer, 42(8), 106-108. doi:10.1109/MC.2009.252
-
(2009)
Computer
, vol.42
, Issue.8
, pp. 106-108
-
-
Viega, J.1
|