메뉴 건너뛰기




Volumn , Issue , 2012, Pages 97-122

A goal-driven risk management approach to support security and privacy analysis of cloud-based system

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84881476966     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-2125-1.ch006     Document Type: Chapter
Times cited : (23)

References (35)
  • 1
    • 53949092999 scopus 로고    scopus 로고
    • Risk and risk management in software projects: A reassessment
    • doi:10.1016/j.jss.2008.03.059
    • Bannerman, P. L. (2008). Risk and risk management in software projects: A reassessment. Journal of Systems and Software, 81(12), 2118-2133. doi:10.1016/j.jss.2008.03.059
    • (2008) Journal of Systems and Software , vol.81 , Issue.12 , pp. 2118-2133
    • Bannerman, P.L.1
  • 2
    • 0025791156 scopus 로고
    • Software risk management: Principles and practices
    • doi:10.1109/52.62930
    • Barry, B. W. (1991). Software risk management: Principles and practices. IEEE Software, 8(1), 32-41. doi:10.1109/52.62930
    • (1991) IEEE Software , vol.8 , Issue.1 , pp. 32-41
    • Barry, B.W.1
  • 4
    • 85008047640 scopus 로고    scopus 로고
    • The competitive edge of risk entrepreneurs
    • doi:10.1109/6294.781627
    • Charette, R. N. (1999). The competitive edge of risk entrepreneurs. IT Professional, 1(4), 69-73. doi:10.1109/6294.781627
    • (1999) IT Professional , vol.1 , Issue.4 , pp. 69-73
    • Charette, R.N.1
  • 9
    • 84898374975 scopus 로고    scopus 로고
    • Retrieved June 16, 2011, from
    • Dropbox. (2011). Retrieved June 16, 2011, from https://www.dropbox.com
    • (2011) Dropbox
  • 12
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • doi:10.1109/MSP.2010.115
    • Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security & Privacy Magazine, 9(2), 50-57. doi:10.1109/MSP.2010.115
    • (2011) IEEE Security & Privacy Magazine , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 19
    • 84858990113 scopus 로고    scopus 로고
    • Towards a framework for offshore outsource software development risk management model
    • doi:10.4304/jsw.6.1.38-47
    • Islam, S., & Houmb, S. H. (2011a). Towards a framework for offshore outsource software development risk management model. Journal of Software, 6(1), 38-47. doi:10.4304/jsw.6.1.38-47
    • (2011) Journal of Software , vol.6 , Issue.1 , pp. 38-47
    • Islam, S.1    Houmb, S.H.2
  • 26
    • 34548508691 scopus 로고    scopus 로고
    • Security attack testing (SAT) - Testing the security of information systems at design time
    • doi:10.1016/j.is.2007.03.002
    • Mouratidis, H., & Giorgini, P. (2007)Security attack testing (SAT) - Testing the security of information systems at design time. Information Systems, 32(8), 1166-1183. doi:10.1016/j.is.2007.03.002
    • (2007) Information Systems , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2
  • 31
    • 84898117566 scopus 로고    scopus 로고
    • SBA, Retrieved November 15, 2011, from
    • SBA. (2011). Secure Business Austria. Retrieved November 15, 2011, from http://www.sbaresearch.org/research/
    • (2011) Secure Business Austria
  • 32
    • 27144463943 scopus 로고    scopus 로고
    • Model-based risk assessment in a component-based software engineering process -Using the CORAS approach to identify security risks
    • F. Barbier (Ed.), Kluwer Academic Publishers
    • Stolen, K., den Braber, F., Fredriksen, R., Gran, B. A., & Houmb, S. H., Stama-tiou Y. C., & Aagedal, J. Â. (2007). Model-based risk assessment in a component-based software engineering process -Using the CORAS approach to identify security risks. In F. Barbier (Ed.), Business componentbased software engineering. Kluwer Academic Publishers.
    • (2007) Business Componentbased Software Engineering
    • Stolen, K.1    den Braber, F.2    Fredriksen, R.3    Gran, B.A.4    Houmb, S.H.5    Stama-Tiou, Y.C.6    Aagedal, J.Â.7
  • 33
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • doi:10.1016/j.jnca.2010.07.006
    • Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1). doi:10.1016/j.jnca.2010.07.006
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1
    • Subashini, S.1    Kavitha, V.2
  • 35
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • doi:10.1109/MC.2009.252
    • Viega, J. (2009). Cloud computing and the common man. Computer, 42(8), 106-108. doi:10.1109/MC.2009.252
    • (2009) Computer , vol.42 , Issue.8 , pp. 106-108
    • Viega, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.