메뉴 건너뛰기




Volumn 18, Issue 4, 2013, Pages 343-395

Erratum to: A pattern-based method for establishing a cloud-specific information security management system (Requirements Eng, 10.1007/s00766-013-0174-7);A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance

Author keywords

Asset identification privacy; Cloud computing security; Control selection; Information security management system; ISO 27001; Legal compliance; Security policies; Threat analysis

Indexed keywords

CLOUD COMPUTING; COMPLIANCE CONTROL; INDUSTRIAL MANAGEMENT; LAWS AND LEGISLATION; RISK ANALYSIS; RISK ASSESSMENT; SECURITY OF DATA;

EID: 84886594364     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-013-0176-5     Document Type: Erratum
Times cited : (33)

References (64)
  • 1
    • 0003765587 scopus 로고    scopus 로고
    • ISO/IEC ISO/IEC 15408, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC)
    • ISO/IEC (2009) Common criteria for information technology security evaluation. ISO/IEC 15408, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
    • (2009) Common criteria for information technology security evaluation
  • 2
    • 79952065844 scopus 로고    scopus 로고
    • Cloud Security Alliance (CSA)
    • Cloud Security Alliance (CSA) (2010) Top threats to cloud computing v1. 0. http://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf.
    • (2010) Top threats to cloud computing v1. 0
  • 4
  • 6
    • 77954051808 scopus 로고    scopus 로고
    • Working Paper of the National Institute of Standards and Technology (NIST)
    • Mell P, Grance T (2009) The NIST definition of cloud computing. Working Paper of the National Institute of Standards and Technology (NIST).
    • (2009) The NIST definition of cloud computing
    • Mell, P.1    Grance, T.2
  • 18
    • 0003729341 scopus 로고    scopus 로고
    • IETF IETF rfc 2104, Internet Engineering Task Force (IETF)
    • IETF (1997) Hmac: keyed-hashing for message authentication. IETF rfc 2104, Internet Engineering Task Force (IETF).
    • (1997) Hmac: Keyed-hashing for message authentication
  • 19
    • 79952952264 scopus 로고    scopus 로고
    • Cloud hooks: Security and privacy issues in cloud computing
    • Jansen WA (2011) Cloud hooks: Security and privacy issues in cloud computing. In: HICSS. IEEE Computer Society, pp 1-10.
    • (2011) In: HICSS. IEEE Computer Society , pp. 1-10
    • Jansen, W.A.1
  • 24
    • 77950536938 scopus 로고    scopus 로고
    • A comparison of security requirements engineering methods
    • Fabian B, Gürses S, Heisel M, Santen T, Schmidt H (2010) A comparison of security requirements engineering methods. Requir Eng 15(1): 7-40.
    • (2010) Requir Eng , vol.15 , Issue.1 , pp. 7-40
    • Fabian, B.1    Gürses, S.2    Heisel, M.3    Santen, T.4    Schmidt, H.5
  • 25
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • Opdahl AL, Sindre G (2009) Experimental comparison of attack trees and misuse cases for security threat identification. Inf Softw Technol 51: 916-932.
    • (2009) Inf Softw Technol , vol.51 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 26
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    • Deng M, Wuyts K, Scandariato R, Preneel B, Joosen W (2011) A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng 16: 3-32.
    • (2011) Requir Eng , vol.16 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 31
    • 84886595430 scopus 로고    scopus 로고
    • VMWARE. Vmware ha
    • VMWARE. Vmware ha. http://www. vmware. com/de/products/datacenter-virtualization/vsphere/high-availability. html.
  • 32
    • 84886592123 scopus 로고    scopus 로고
    • VMWARE. Vmware vmotion
    • VMWARE. Vmware vmotion. http://www. vmware. com/files/pdf/VMware-VMotion-DS-EN. pdf.
  • 35
    • 78650958795 scopus 로고
    • Esplex: a rule and conceptual model for representing statutes
    • Biagioli C, Mariani P, Tiscornia D (1987) Esplex: a rule and conceptual model for representing statutes. In: ICAIL. ACM, pp 240-251.
    • (1987) In: ICAIL. ACM , pp. 240-251
    • Biagioli, C.1    Mariani, P.2    Tiscornia, D.3
  • 36
    • 84886595073 scopus 로고    scopus 로고
    • Gelöste und ungelöste Rechtsfragen im IT-Outsourcing und Cloud Computing
    • A. Picot, T. Götz, and U. Hertz (Eds.), Berlin: Springer
    • Duisberg A (2011) Gelöste und ungelöste Rechtsfragen im IT-Outsourcing und Cloud Computing. In: Picot A, Götz T, Hertz U (eds) Trust in IT, Springer, Berlin, pp 49-70.
    • (2011) Trust in IT , pp. 49-70
    • Duisberg, A.1
  • 37
    • 84874232416 scopus 로고    scopus 로고
    • In: Dittmann J (ed.), Sicherheit 2006: Sicherheit-Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. v. (GI), pp 20-22. Februar 2006 in Magdeburg, vol 77 of LNI
    • Gürses SF, Santen T (2006) Contextualizing security goals: a method for multilateral security requirements elicitation. In: Dittmann J (ed.), Sicherheit 2006: Sicherheit-Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. v. (GI), pp 20-22. Februar 2006 in Magdeburg, vol 77 of LNI., pp 42-53. GI.
    • (2006) Contextualizing security goals: A method for multilateral security requirements elicitation , pp. 42-53
    • Gürses, S.F.1    Santen, T.2
  • 51
    • 84857462462 scopus 로고    scopus 로고
    • In: Internet technology and secured transactions (ICITST), 2011 international conference for
    • Shaikh F, Haider S (2011) Security threats in cloud computing. In: Internet technology and secured transactions (ICITST), 2011 international conference for, pp 214 -219.
    • (2011) Security threats in cloud computing , pp. 214-219
    • Shaikh, F.1    Haider, S.2
  • 53
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. Secur Priv, IEEE 9(2): 50-57.
    • (2011) Secur Priv, IEEE , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 54
    • 0011326587 scopus 로고    scopus 로고
    • ISO/IEC 27005, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) ISO/IEC
    • ISO/IEC (2008) Information technology-security techniques-information security risk management. ISO/IEC 27005, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
    • (2008) Information technology-security techniques-information security risk management
  • 55
    • 38149018837 scopus 로고    scopus 로고
    • Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations
    • Breaux TD, Vail MW, Antón AI (2006) Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations. In: RE, IEEE Computer Society, pp 46-55.
    • (2006) In: RE, IEEE Computer Society , pp. 46-55
    • Breaux, T.D.1    Vail, M.W.2    Antón, A.I.3
  • 56
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1): 5-20.
    • (2008) IEEE Trans Softw Eng , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 57
    • 85033566750 scopus 로고
    • Logic programming for large scale applications in law: a formalization of supplementary benefit legislation
    • Bench-Capon T, Robinson G, Routen T, Sergot M (1987) Logic programming for large scale applications in law: a formalization of supplementary benefit legislation. In: ICAIL, ACM, pp 190-198.
    • (1987) In: ICAIL, ACM , pp. 190-198
    • Bench-Capon, T.1    Robinson, G.2    Routen, T.3    Sergot, M.4
  • 59
    • 0001232077 scopus 로고
    • Fundamental legal conceptions as applied in judicial reasoning
    • Hohfeld WN (1917) Fundamental legal conceptions as applied in judicial reasoning. Yale Law J 26(8): 710-770.
    • (1917) Yale Law J , vol.26 , Issue.8 , pp. 710-770
    • Hohfeld, W.N.1
  • 62
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: the PriS method
    • Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13: 241-255.
    • (2008) Requir Eng , vol.13 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 64
    • 84886585682 scopus 로고    scopus 로고
    • UML Revision Task Force OMG object constraint language: reference
    • UML Revision Task Force (2010) OMG object constraint language: reference.
    • (2010)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.