메뉴 건너뛰기




Volumn 18, Issue 4, 2013, Pages 299-319

Evaluating cloud deployment scenarios based on security and privacy requirements

Author keywords

Cloud; Cloud deployment model; Cloud migration; Privacy requirements; Security requirements

Indexed keywords

CLOUD COMPUTING SECURITIES; CLOUD DEPLOYMENTS; CLOUD ENGINEERINGS; CLOUD MIGRATIONS; PRIVACY REQUIREMENTS; SECURITY AND PRIVACY; SECURITY REQUIREMENTS; STRATEGIC DECISIONS;

EID: 84886639116     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-013-0166-7     Document Type: Article
Times cited : (36)

References (25)
  • 3
    • 84886641799 scopus 로고    scopus 로고
    • Version one survey results: cloud confusion amongst IT professionals 24 June 2009
    • Version one survey results: cloud confusion amongst IT professionals. http://www. versionone. co. uk/news/cloud-of-confusion-amongst-it-professionals. php. 24 June 2009.
  • 4
    • 79952367895 scopus 로고    scopus 로고
    • In: 2nd IEEE International conference on cloud computing technology and science, IEEE Computer Society, UK
    • Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International conference on cloud computing technology and science, IEEE Computer Society, UK, pp 693-702.
    • (2010) Privacy, security and trust issues arising from cloud computing , pp. 693-702
    • Pearson, S.1    Benameur, A.2
  • 6
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: the PriS method
    • Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13(3): 241-255.
    • (2008) Requir Eng , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 7
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec
    • Houmb SH, Islam S, Knauss E, Jürjens J, Schneider K (2010) Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requir Eng J 15(1): 63-93.
    • (2010) Requir Eng J , vol.15 , Issue.1 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5
  • 8
    • 84881008891 scopus 로고    scopus 로고
    • Model based process to support security and privacy requirements engineering
    • IGI Global Publication
    • Islam S, Mouratidis H, Kalloniatis C., Hudic A, Zechner L, (2012a). Model based process to support security and privacy requirements engineering. Int J Secur Softw Eng 3(3): 1-22, IGI Global Publication.
    • (2012) Int J Secur Softw Eng , vol.3 , Issue.3 , pp. 1-22
    • Islam, S.1    Mouratidis, H.2    Kalloniatis, C.3    Hudic, A.4    Zechner, L.5
  • 9
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng J 10(1): 34-44.
    • (2005) Requir Eng J , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 12
    • 84886641756 scopus 로고    scopus 로고
    • Yankee Group Migrating to the cloud is dependent infrastructure, Tech Target
    • com. Retrieved 2011-12-02
    • Kerravala Z, Yankee Group Migrating to the cloud is dependent infrastructure, Tech Target. Convergedinfrastructure. com. Retrieved 2011-12-02.
    • Convergedinfrastructure
    • Kerravala, Z.1
  • 13
    • 84886212331 scopus 로고    scopus 로고
    • Introduction to cloud computing
    • ISBN 978-0-470-88799-8, R. Buyya, J. Broberg, and A. Goscinski (Eds.), New York: Wiley
    • Voorsluys W, Broberg J, Buyya R (2011) Introduction to cloud computing. In: Buyya R, Broberg J, Goscinski A (eds) A cloud computing: principles and paradigms. Wiley, New York, pp 1-44 ISBN 978-0-470-88799-8.
    • (2011) A Cloud Computing: Principles and Paradigms , pp. 1-44
    • Voorsluys, W.1    Broberg, J.2    Buyya, R.3
  • 16
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: a security-oriented extension of the tropos methodology
    • © World Scientific Publishing Company
    • Mouratidis H, Giorgini P (2006) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2): 285-309 © World Scientific Publishing Company.
    • (2006) Int J Softw Eng Knowl Eng , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 19
    • 84866253432 scopus 로고    scopus 로고
    • Aligning security and privacy to support the development of secure information systems
    • Mouratidis H, Kalloniatis C, Islam S, Huget MP, Gritzalis S (2012) Aligning security and privacy to support the development of secure information systems. J of Univers Comput Sci 18(12): 1608-1627.
    • (2012) J of Univers Comput Sci , vol.18 , Issue.12 , pp. 1608-1627
    • Mouratidis, H.1    Kalloniatis, C.2    Islam, S.3    Huget, M.P.4    Gritzalis, S.5
  • 21
    • 70849084080 scopus 로고    scopus 로고
    • Methods for designing privacy aware information systems: a review
    • In: Chrysikopoulos V, Alexandris N, Douligeris C, Sioutas S (eds) Sept 2009, Corfu, Greece, IEEE CPS Conference Publishing Services
    • Kalloniatis C, Kavakli E, Gritzalis S, Methods for designing privacy aware information systems: a review, In: Chrysikopoulos V, Alexandris N, Douligeris C, Sioutas S (eds), Proceedings of the PCI 2009 13th Pan-Hellenic conference on informatics, Sept 2009, Corfu, Greece, IEEE CPS Conference Publishing Services pp. 185-194.
    • Proceedings of the PCI 2009 13th Pan-Hellenic conference on informatics , pp. 185-194
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 23
    • 77950519059 scopus 로고    scopus 로고
    • Evaluating existing security and privacy requirements for legal compliance
    • Massey AK, Otto PN, Hayward LJ, Antón AI (2010) Evaluating existing security and privacy requirements for legal compliance. Requir Eng J 15(1): 119-137.
    • (2010) Requir Eng J , vol.15 , Issue.1 , pp. 119-137
    • Massey, A.K.1    Otto, P.N.2    Hayward, L.J.3    Antón, A.I.4
  • 25
    • 79952004992 scopus 로고    scopus 로고
    • A methodology for security assurance-driven system development
    • doi:10.1007/s00766-010-0114-8
    • Vivas JL, Agudo I, Lopez J (2011) A methodology for security assurance-driven system development. Requir Eng 16(1): 55-73. doi: 10. 1007/s00766-010-0114-8.
    • (2011) Requir Eng , vol.16 , Issue.1 , pp. 55-73
    • Vivas, J.L.1    Agudo, I.2    Lopez, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.