-
2
-
-
71749105371
-
-
Gartner group, ID Number: G00157782 published June 3
-
Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing, white paper, Gartner group, ID Number: G00157782 (published June 3, 2008)
-
(2008)
Assessing the Security Risks of Cloud Computing, white paper
-
-
Heiser, J.1
Nicolett, M.2
-
3
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1-11 (2010)
-
(2010)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
6
-
-
84864680369
-
PriS Methodology: Incorporating Privacy Requirements into the System Design Process
-
In: Mylopoulos, J., Spafford, G. (eds.), Paris
-
Kalloniatis, C., Kavakli, E., Gritzalis, S.: PriS Methodology: Incorporating Privacy Requirements into the System Design Process. In: Mylopoulos, J., Spafford, G. (eds.) Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference-Symposium on Requirements Engineering for Information Security. IEEE CPS, Paris (2005)
-
(2005)
Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference-Symposium on Requirements Engineering for Information Security. IEEE CPS
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
7
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requirements Engineering 13(3), 241-255 (2008)
-
(2008)
Requirements Engineering
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
8
-
-
84864709485
-
PRIS tool: A case tool for privacy-oriented Requirements Engineering
-
Kalloniatis, C., Kavakli, E., Kontellis, E.: PRIS tool: A case tool for privacy-oriented Requirements Engineering. Journal of Information Systems Security 6(1), 3-19 (2010)
-
(2010)
Journal of Information Systems Security
, vol.6
, Issue.1
, pp. 3-19
-
-
Kalloniatis, C.1
Kavakli, E.2
Kontellis, E.3
-
9
-
-
33646358507
-
Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework
-
Kavakli, E., Kalloniatis, C., Loucopoulos, P., Gritzalis, S.: Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework. Internet Research, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice 16(2), 140-158 (2006)
-
(2006)
Internet Research, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice
, vol.16
, Issue.2
, pp. 140-158
-
-
Kavakli, E.1
Kalloniatis, C.2
Loucopoulos, P.3
Gritzalis, S.4
-
10
-
-
33846969170
-
Dealing with Privacy Issues during the System Design Process
-
In, Athens, Greece, December 18-21
-
Kalloniats, C., Kavakli, E., Gritzalis, S.: Dealing with Privacy Issues during the System Design Process. In: 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, December 18-21 (2005)
-
(2005)
5th IEEE International Symposium on Signal Processing and Information Technology
-
-
Kalloniats, C.1
Kavakli, E.2
Gritzalis, S.3
-
11
-
-
84866253432
-
Aligning Security and Privacy to support the development of Secure Information Systems
-
Mouratidis, H., Kalloniatis, C., Islam, S., Huget, M.P., Gritzalis, S.: Aligning Security and Privacy to support the development of Secure Information Systems. Journal of Universal Computer Science (2012)
-
(2012)
Journal of Universal Computer Science
-
-
Mouratidis, H.1
Kalloniatis, C.2
Islam, S.3
Huget, M.P.4
Gritzalis, S.5
-
13
-
-
34548508691
-
Security Attack Testing (SAT)-testing the security of information systems at design time
-
Mouratidis, Giorgini, P.: Security Attack Testing (SAT)-testing the security of information systems at design time. Inf. Syst. 32(8), 1166-1183 (2007)
-
(2007)
Inf. Syst.
, vol.32
, Issue.8
, pp. 1166-1183
-
-
Mouratidis, G.P.1
|