-
2
-
-
84881476966
-
-
In: Rosado DG, Mellado D, Fernández-Medina E, Piattini M (eds) Security engineering for cloud computing: approaches and tools. IGI Global Publication, Hershey
-
Islam S, Mouratidis H, Weippl E (2012) A goal-driven risk management approach to support security and privacy analysis of cloud-based system. In: Rosado DG, Mellado D, Fernández-Medina E, Piattini M (eds) Security engineering for cloud computing: approaches and tools. IGI Global Publication, Hershey.
-
(2012)
A goal-driven risk management approach to support security and privacy analysis of cloud-based system
-
-
Islam, S.1
Mouratidis, H.2
Weippl, E.3
-
3
-
-
84886641799
-
-
Version one survey results: cloud confusion amongst IT professionals 24 June 2009
-
Version one survey results: cloud confusion amongst IT professionals. http://www. versionone. co. uk/news/cloud-of-confusion-amongst-it-professionals. php. 24 June 2009.
-
-
-
-
4
-
-
79952367895
-
-
In: 2nd IEEE International conference on cloud computing technology and science, IEEE Computer Society, UK
-
Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International conference on cloud computing technology and science, IEEE Computer Society, UK, pp 693-702.
-
(2010)
Privacy, security and trust issues arising from cloud computing
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
6
-
-
50949085110
-
Addressing privacy requirements in system design: the PriS method
-
Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13(3): 241-255.
-
(2008)
Requir Eng
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
7
-
-
77950516884
-
Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec
-
Houmb SH, Islam S, Knauss E, Jürjens J, Schneider K (2010) Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requir Eng J 15(1): 63-93.
-
(2010)
Requir Eng J
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
8
-
-
84881008891
-
Model based process to support security and privacy requirements engineering
-
IGI Global Publication
-
Islam S, Mouratidis H, Kalloniatis C., Hudic A, Zechner L, (2012a). Model based process to support security and privacy requirements engineering. Int J Secur Softw Eng 3(3): 1-22, IGI Global Publication.
-
(2012)
Int J Secur Softw Eng
, vol.3
, Issue.3
, pp. 1-22
-
-
Islam, S.1
Mouratidis, H.2
Kalloniatis, C.3
Hudic, A.4
Zechner, L.5
-
9
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng J 10(1): 34-44.
-
(2005)
Requir Eng J
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
12
-
-
84886641756
-
Yankee Group Migrating to the cloud is dependent infrastructure, Tech Target
-
com. Retrieved 2011-12-02
-
Kerravala Z, Yankee Group Migrating to the cloud is dependent infrastructure, Tech Target. Convergedinfrastructure. com. Retrieved 2011-12-02.
-
Convergedinfrastructure
-
-
Kerravala, Z.1
-
13
-
-
84886212331
-
Introduction to cloud computing
-
ISBN 978-0-470-88799-8, R. Buyya, J. Broberg, and A. Goscinski (Eds.), New York: Wiley
-
Voorsluys W, Broberg J, Buyya R (2011) Introduction to cloud computing. In: Buyya R, Broberg J, Goscinski A (eds) A cloud computing: principles and paradigms. Wiley, New York, pp 1-44 ISBN 978-0-470-88799-8.
-
(2011)
A Cloud Computing: Principles and Paradigms
, pp. 1-44
-
-
Voorsluys, W.1
Broberg, J.2
Buyya, R.3
-
16
-
-
34249004734
-
Secure tropos: a security-oriented extension of the tropos methodology
-
© World Scientific Publishing Company
-
Mouratidis H, Giorgini P (2006) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2): 285-309 © World Scientific Publishing Company.
-
(2006)
Int J Softw Eng Knowl Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
18
-
-
78649899214
-
The Characteristics of Cloud Computing
-
Gong C, Liu J, Zhang Q, Chen H Gong Z (2010) The Characteristics of Cloud Computing. In: proceedings of the 2010 39th International Conference on Parallel Processing Workshops, IEEE Computer Society Washington.
-
(2010)
In: Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, IEEE Computer Society Washington
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
19
-
-
84866253432
-
Aligning security and privacy to support the development of secure information systems
-
Mouratidis H, Kalloniatis C, Islam S, Huget MP, Gritzalis S (2012) Aligning security and privacy to support the development of secure information systems. J of Univers Comput Sci 18(12): 1608-1627.
-
(2012)
J of Univers Comput Sci
, vol.18
, Issue.12
, pp. 1608-1627
-
-
Mouratidis, H.1
Kalloniatis, C.2
Islam, S.3
Huget, M.P.4
Gritzalis, S.5
-
20
-
-
33846969170
-
Dealing with privacy issues during the system design process
-
In: Serpanos D et al. (eds) Dec 2005, Athens, Greece, IEEE CPS Conference Publishing Services
-
Kalloniatis C, Kavakli E, Gritzalis S (2005) Dealing with privacy issues during the system design process In: Serpanos D et al. (eds), Proceedings of the ISSPIT'05 5th IEEE International symposium on signal processing and information technology. Dec 2005, Athens, Greece, IEEE CPS Conference Publishing Services pp 546-551.
-
(2005)
Proceedings of the ISSPIT'05 5th IEEE International symposium on signal processing and information technology
, pp. 546-551
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
21
-
-
70849084080
-
Methods for designing privacy aware information systems: a review
-
In: Chrysikopoulos V, Alexandris N, Douligeris C, Sioutas S (eds) Sept 2009, Corfu, Greece, IEEE CPS Conference Publishing Services
-
Kalloniatis C, Kavakli E, Gritzalis S, Methods for designing privacy aware information systems: a review, In: Chrysikopoulos V, Alexandris N, Douligeris C, Sioutas S (eds), Proceedings of the PCI 2009 13th Pan-Hellenic conference on informatics, Sept 2009, Corfu, Greece, IEEE CPS Conference Publishing Services pp. 185-194.
-
Proceedings of the PCI 2009 13th Pan-Hellenic conference on informatics
, pp. 185-194
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
22
-
-
77955462130
-
Toward a framework to elicit and manage security and privacy requirements from laws and regulation
-
Islam S, Mouratidis H, Wagner S (2010) Toward a framework to elicit and manage security and privacy requirements from laws and regulation, In: Proceeding of requirements engineering: foundation for software quality(REFSQ), Lecture notes in computer science, Vol 6182/2010, pp 255-261.
-
(2010)
In: Proceeding of requirements engineering: Foundation for software quality(REFSQ), Lecture notes in computer science
, vol.2010
, pp. 255-261
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
-
23
-
-
77950519059
-
Evaluating existing security and privacy requirements for legal compliance
-
Massey AK, Otto PN, Hayward LJ, Antón AI (2010) Evaluating existing security and privacy requirements for legal compliance. Requir Eng J 15(1): 119-137.
-
(2010)
Requir Eng J
, vol.15
, Issue.1
, pp. 119-137
-
-
Massey, A.K.1
Otto, P.N.2
Hayward, L.J.3
Antón, A.I.4
-
25
-
-
79952004992
-
A methodology for security assurance-driven system development
-
doi:10.1007/s00766-010-0114-8
-
Vivas JL, Agudo I, Lopez J (2011) A methodology for security assurance-driven system development. Requir Eng 16(1): 55-73. doi: 10. 1007/s00766-010-0114-8.
-
(2011)
Requir Eng
, vol.16
, Issue.1
, pp. 55-73
-
-
Vivas, J.L.1
Agudo, I.2
Lopez, J.3
|