-
1
-
-
0003765587
-
-
ISO/IEC ISO/IEC 15408, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC)
-
ISO/IEC (2009) Common criteria for information technology security evaluation. ISO/IEC 15408, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
-
(2009)
Common criteria for information technology security evaluation
-
-
-
2
-
-
79952065844
-
-
Cloud Security Alliance (CSA)
-
Cloud Security Alliance (CSA) (2010) Top threats to cloud computing v1. 0. http://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf.
-
(2010)
Top threats to cloud computing v1. 0
-
-
-
4
-
-
33644658584
-
-
ISO/IEC ISO/IEC 27001, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC)
-
ISO/IEC (2005) Information technology-Security techniques-Information security management systems-Requirements. ISO/IEC 27001, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
-
(2005)
Information technology-Security techniques-Information security management systems-Requirements
-
-
-
5
-
-
68249129760
-
-
Technical report, EECS Department, University of California, Berkeley
-
Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2009) Above the clouds: A berkeley view of cloud computing. Technical report, EECS Department, University of California, Berkeley.
-
(2009)
Above the clouds: A berkeley view of cloud computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
6
-
-
77954051808
-
-
Working Paper of the National Institute of Standards and Technology (NIST)
-
Mell P, Grance T (2009) The NIST definition of cloud computing. Working Paper of the National Institute of Standards and Technology (NIST).
-
(2009)
The NIST definition of cloud computing
-
-
Mell, P.1
Grance, T.2
-
7
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
Vaquero LM, Rodero-Merino L, Caceres J, Lindner M (2008) A break in the clouds: Towards a cloud definition. Special Interest Group Data Commun (SIGCOMM) Comput Commun Rev 39(1): 50-55.
-
(2008)
Special Interest Group Data Commun (SIGCOMM) Comput Commun Rev
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
9
-
-
80455140374
-
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
-
Beckers K, Küster JC, Faßbender S, Schmidt H (2011) Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing. In: Proceedings of the international conference on availability, reliability and security (ARES). IEEE Computer Society, pp 327-333.
-
(2011)
Proceedings of the international conference on availability, reliability and security (ARES). IEEE Computer Society
, pp. 327-333
-
-
Beckers, K.1
Küster, J.C.2
Faßbender, S.3
Schmidt, H.4
-
12
-
-
0003880013
-
-
Reading, MA: Addison-Wesley
-
Gamma E, Helm R, Johnson R, Vlissides J (1994) Design patterns: elements of reusable object-oriented software. Addison-Wesley, Reading, MA.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
13
-
-
33750050331
-
-
New York: Wiley
-
Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P (2006) Security patterns: integrating security and systems engineering. Wiley, New York.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
18
-
-
0003729341
-
-
IETF IETF rfc 2104, Internet Engineering Task Force (IETF)
-
IETF (1997) Hmac: keyed-hashing for message authentication. IETF rfc 2104, Internet Engineering Task Force (IETF).
-
(1997)
Hmac: Keyed-hashing for message authentication
-
-
-
19
-
-
79952952264
-
Cloud hooks: Security and privacy issues in cloud computing
-
Jansen WA (2011) Cloud hooks: Security and privacy issues in cloud computing. In: HICSS. IEEE Computer Society, pp 1-10.
-
(2011)
In: HICSS. IEEE Computer Society
, pp. 1-10
-
-
Jansen, W.A.1
-
21
-
-
74049093526
-
Controlling data in the cloud: outsourcing computation without outsourcing control
-
Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In: CCSW. ACM, pp 85-90.
-
(2009)
In: CCSW. ACM
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
22
-
-
84870734121
-
-
Technical report, NIST, Gaithersburg, MD, USA
-
Scarfone KA, Souppaya MP, Hoffman P (2011) Sp 800-125. guide to security for full virtualization technologies. Technical report, NIST, Gaithersburg, MD, USA.
-
(2011)
Sp 800-125. guide to security for full virtualization technologies
-
-
Scarfone, K.A.1
Souppaya, M.P.2
Hoffman, P.3
-
24
-
-
77950536938
-
A comparison of security requirements engineering methods
-
Fabian B, Gürses S, Heisel M, Santen T, Schmidt H (2010) A comparison of security requirements engineering methods. Requir Eng 15(1): 7-40.
-
(2010)
Requir Eng
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gürses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
25
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
Opdahl AL, Sindre G (2009) Experimental comparison of attack trees and misuse cases for security threat identification. Inf Softw Technol 51: 916-932.
-
(2009)
Inf Softw Technol
, vol.51
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
26
-
-
79952002261
-
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
-
Deng M, Wuyts K, Scandariato R, Preneel B, Joosen W (2011) A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng 16: 3-32.
-
(2011)
Requir Eng
, vol.16
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
31
-
-
84886595430
-
-
VMWARE. Vmware ha
-
VMWARE. Vmware ha. http://www. vmware. com/de/products/datacenter-virtualization/vsphere/high-availability. html.
-
-
-
-
32
-
-
84886592123
-
-
VMWARE. Vmware vmotion
-
VMWARE. Vmware vmotion. http://www. vmware. com/files/pdf/VMware-VMotion-DS-EN. pdf.
-
-
-
-
35
-
-
78650958795
-
Esplex: a rule and conceptual model for representing statutes
-
Biagioli C, Mariani P, Tiscornia D (1987) Esplex: a rule and conceptual model for representing statutes. In: ICAIL. ACM, pp 240-251.
-
(1987)
In: ICAIL. ACM
, pp. 240-251
-
-
Biagioli, C.1
Mariani, P.2
Tiscornia, D.3
-
36
-
-
84886595073
-
Gelöste und ungelöste Rechtsfragen im IT-Outsourcing und Cloud Computing
-
A. Picot, T. Götz, and U. Hertz (Eds.), Berlin: Springer
-
Duisberg A (2011) Gelöste und ungelöste Rechtsfragen im IT-Outsourcing und Cloud Computing. In: Picot A, Götz T, Hertz U (eds) Trust in IT, Springer, Berlin, pp 49-70.
-
(2011)
Trust in IT
, pp. 49-70
-
-
Duisberg, A.1
-
37
-
-
84874232416
-
-
In: Dittmann J (ed.), Sicherheit 2006: Sicherheit-Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. v. (GI), pp 20-22. Februar 2006 in Magdeburg, vol 77 of LNI
-
Gürses SF, Santen T (2006) Contextualizing security goals: a method for multilateral security requirements elicitation. In: Dittmann J (ed.), Sicherheit 2006: Sicherheit-Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. v. (GI), pp 20-22. Februar 2006 in Magdeburg, vol 77 of LNI., pp 42-53. GI.
-
(2006)
Contextualizing security goals: A method for multilateral security requirements elicitation
, pp. 42-53
-
-
Gürses, S.F.1
Santen, T.2
-
41
-
-
82455212656
-
UML4PF-a tool for problem-oriented requirements analysis
-
Côté I, Hatebur D, Heisel M, Schmidt H (2011) UML4PF-a tool for problem-oriented requirements analysis. In: Proceedings of the international conference on requirements engineering (RE), IEEE Computer Society, pp 349-350.
-
(2011)
Proceedings of the international conference on requirements engineering (RE), IEEE Computer Society
, pp. 349-350
-
-
Côté, I.1
Hatebur, D.2
Heisel, M.3
Schmidt, H.4
-
42
-
-
78649989557
-
-
Technical report, TU Dresden and ULD Kiel
-
Pfitzmann A, Hansen M (2011) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management-version v0. 34. Technical report, TU Dresden and ULD Kiel.
-
(2011)
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management-version v0. 34
-
-
Pfitzmann, A.1
Hansen, M.2
-
46
-
-
80455140332
-
Information security integral engineering technique and its application in isms design
-
Lyubimov A, Cheremushkin D, Andreeva N, Shustikov S (2011) Information security integral engineering technique and its application in isms design. In: Proceedings of the international conference on availability, reliability and security (ARES), IEEE Computer Society, pp 585-590.
-
(2011)
Proceedings of the international conference on availability, reliability and security (ARES), IEEE Computer Society
, pp. 585-590
-
-
Lyubimov, A.1
Cheremushkin, D.2
Andreeva, N.3
Shustikov, S.4
-
48
-
-
50049109224
-
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
-
Fenz S, Goluch G, Ekelhart A, Riedl B, Weippl E (2007) Information security fortification by ontological mapping of the ISO/IEC 27001 standard. In: Proceedings of the international symposium on dependable computing, IEEE Computer Society, pp 381-388.
-
(2007)
Proceedings of the international symposium on dependable computing, IEEE Computer Society
, pp. 381-388
-
-
Fenz, S.1
Goluch, G.2
Ekelhart, A.3
Riedl, B.4
Weippl, E.5
-
49
-
-
79952404731
-
Inadequacies of current risk controls for the cloud
-
CLOUDCOM '10, IEEE Computer Society
-
Auty M, Creese S, Goldsmith M, Hopkins P (2010) Inadequacies of current risk controls for the cloud. In: Proceedings of the 2010 IEEE second international conference on cloud computing technology and science. CLOUDCOM '10, IEEE Computer Society, pp 659-666.
-
(2010)
Proceedings of the 2010 IEEE second international conference on cloud computing technology and science
, pp. 659-666
-
-
Auty, M.1
Creese, S.2
Goldsmith, M.3
Hopkins, P.4
-
51
-
-
84857462462
-
-
In: Internet technology and secured transactions (ICITST), 2011 international conference for
-
Shaikh F, Haider S (2011) Security threats in cloud computing. In: Internet technology and secured transactions (ICITST), 2011 international conference for, pp 214 -219.
-
(2011)
Security threats in cloud computing
, pp. 214-219
-
-
Shaikh, F.1
Haider, S.2
-
53
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. Secur Priv, IEEE 9(2): 50-57.
-
(2011)
Secur Priv, IEEE
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
54
-
-
0011326587
-
-
ISO/IEC 27005, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) ISO/IEC
-
ISO/IEC (2008) Information technology-security techniques-information security risk management. ISO/IEC 27005, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
-
(2008)
Information technology-security techniques-information security risk management
-
-
-
55
-
-
38149018837
-
Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations
-
Breaux TD, Vail MW, Antón AI (2006) Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations. In: RE, IEEE Computer Society, pp 46-55.
-
(2006)
In: RE, IEEE Computer Society
, pp. 46-55
-
-
Breaux, T.D.1
Vail, M.W.2
Antón, A.I.3
-
56
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1): 5-20.
-
(2008)
IEEE Trans Softw Eng
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
57
-
-
85033566750
-
Logic programming for large scale applications in law: a formalization of supplementary benefit legislation
-
Bench-Capon T, Robinson G, Routen T, Sergot M (1987) Logic programming for large scale applications in law: a formalization of supplementary benefit legislation. In: ICAIL, ACM, pp 190-198.
-
(1987)
In: ICAIL, ACM
, pp. 190-198
-
-
Bench-Capon, T.1
Robinson, G.2
Routen, T.3
Sergot, M.4
-
59
-
-
0001232077
-
Fundamental legal conceptions as applied in judicial reasoning
-
Hohfeld WN (1917) Fundamental legal conceptions as applied in judicial reasoning. Yale Law J 26(8): 710-770.
-
(1917)
Yale Law J
, vol.26
, Issue.8
, pp. 710-770
-
-
Hohfeld, W.N.1
-
60
-
-
77952993038
-
A meta-model for modelling law-compliant requirements
-
Siena A, Perini A, Susi A, Mylopoulos J (2009) A meta-model for modelling law-compliant requirements. In: Proceedings of the international workshop on requirements engineering and law (RELAW), IEEE Computer Society, pp 45-51.
-
(2009)
Proceedings of the international workshop on requirements engineering and law (RELAW), IEEE Computer Society
, pp. 45-51
-
-
Siena, A.1
Perini, A.2
Susi, A.3
Mylopoulos, J.4
-
62
-
-
50949085110
-
Addressing privacy requirements in system design: the PriS method
-
Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13: 241-255.
-
(2008)
Requir Eng
, vol.13
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
64
-
-
84886585682
-
-
UML Revision Task Force OMG object constraint language: reference
-
UML Revision Task Force (2010) OMG object constraint language: reference.
-
(2010)
-
-
|