-
3
-
-
79952065844
-
-
(Retrieved 2012-09-22 Last access 09/01/2013)
-
Cloud Security Alliance Top threats to cloud computing V1.0 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf (Retrieved 2012-09-22 Last access 09/01/2013)
-
Top Threats to Cloud Computing V1.0
-
-
Security Alliance, C.1
-
4
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
7
-
-
78649899214
-
The characteristics of cloud computing
-
IEEE Computer Society Washington, DC, USA
-
C. Gong, J. Liu, Q. Zhang, H. Chen, and Z. Gong The characteristics of cloud computing Proceedings of the 2010 39th International Conference on Parallel Processing Workshops 2010 IEEE Computer Society Washington, DC, USA
-
(2010)
Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
8
-
-
84866253432
-
Aligning security and privacy to support the development of secure information systems
-
H. Mouratidis, C. Kalloniatis, S. Islam, M.P. Huget, and S. Gritzalis Aligning security and privacy to support the development of secure information systems J. Univ. Comput. Sci. 18 12 2012 1608 1627
-
(2012)
J. Univ. Comput. Sci.
, vol.18
, Issue.12
, pp. 1608-1627
-
-
Mouratidis, H.1
Kalloniatis, C.2
Islam, S.3
Huget, M.P.4
Gritzalis, S.5
-
10
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requir. Eng. J. 10 1 2005 34 44
-
(2005)
Requir. Eng. J.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
11
-
-
84881008891
-
Model based process to support security and privacy requirements engineering
-
IGI Global Publication
-
S. Islam, H. Mouratidis, C. Kalloniatis, A. Hudic, and L. Zechner Model based process to support security and privacy requirements engineering International Journal of Secure Software Engineering (IJSSE) vol. 3, No 3 September, 2012 IGI Global Publication
-
(2012)
International Journal of Secure Software Engineering (IJSSE)
, vol.33
-
-
Islam, S.1
Mouratidis, H.2
Kalloniatis, C.3
Hudic, A.4
Zechner, L.5
-
15
-
-
71749105371
-
Assessing the Security Risks of Cloud Computing
-
Gartner Group (ID Number: G00157782 Last access 09/01/2013)
-
J. Heiser, and M. Nicolett Assessing the Security Risks of Cloud Computing white paper 2008 Gartner Group (ID Number: G00157782 Last access 09/01/2013)
-
(2008)
White Paper
-
-
Heiser, J.1
Nicolett, M.2
-
20
-
-
84894229610
-
-
Jeff Bezos' Risky Bet", Business Week, (Last access 09/01/2013)
-
"Jeff Bezos' Risky Bet", Business Week, http://www. businessweek.com/stories/2006-11-12/jeff-bezos-risky-bet, (Last access 09/01/2013).
-
-
-
-
21
-
-
84894287583
-
-
King, Rachael, Cloud computing: small companies take flight, Businessweek. (Last access 09/12/2012)
-
King, Rachael, Cloud computing: small companies take flight, http://www.businessweek.com/stories/2008-08-04/cloud-computing-small-companies- take-flightbusinessweek-business-news-stock-market-and-financial-advice Businessweek. (Last access 09/12/2012).
-
-
-
-
22
-
-
84894274416
-
-
Defining and Measuring Cloud Elasticity, KIT Software Quality Departement. (Last access 13/08/2012)
-
Defining and Measuring Cloud Elasticity, KIT Software Quality Departement. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000023476. (Last access 13/08/2012).
-
-
-
-
23
-
-
84894232988
-
-
Of Cloud Scale Infrastructure E. Cloud Slam (Last access 13/05/2012)
-
Economies of Cloud Scale Infrastructure 2011 Cloud Slam (Last access 13/05/2012)
-
(2011)
-
-
-
24
-
-
84894258487
-
-
Farber, Dan. The new geek chic: data centers. CNET News. (Last access 22/08/2012)
-
Farber, Dan. The new geek chic: data centers. http://news.cnet.com/8301- 13953-3-9977049-80.html CNET News. (Last access 22/08/2012).
-
-
-
-
25
-
-
44649122227
-
Guidelines for performing systematic literature reviews in software engineering, version 2.3
-
University of Keele and Durham University
-
B. Kitchenham, and S. Charters Guidelines for performing systematic literature reviews in software engineering, version 2.3 EBSE Technical Report 2007 University of Keele and Durham University
-
(2007)
EBSE Technical Report
-
-
Kitchenham, B.1
Charters, S.2
-
26
-
-
84880192224
-
Security and privacy in cloud computing: A survey
-
M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou Security and privacy in cloud computing: a survey Proceeding of 6th IEEE International Conference on Semantics, Knowledge and Grids 2010
-
(2010)
Proceeding of 6th IEEE International Conference on Semantics, Knowledge and Grids
-
-
Zhou, M.1
Zhang, R.2
Xie, W.3
Qian, W.4
Zhou, A.5
-
27
-
-
80052421239
-
A case for hardware protection of guest VMs from compromised hypervisors in cloud computing
-
J. Szefer, and R.B. Lee A case for hardware protection of guest VMs from compromised hypervisors in cloud computing ICDCS Workshops 2011 248 252
-
(2011)
ICDCS Workshops
, pp. 248-252
-
-
Szefer, J.1
Lee, R.B.2
-
31
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
ACM New York, NY, USA 978-1-60558-784-4
-
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning Managing security of virtual machine images in a cloud environment Proceedings of the ACM workshop on Cloud computing security 2009 ACM New York, NY, USA 978-1-60558-784-4 91 96
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
32
-
-
74049152260
-
Hey, You, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM New York 978-1-60558-894-0
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage Hey, You, get off of my cloud: exploring information leakage in third-party compute clouds Proceedings of the 16th ACM conference on Computer and communications security (CCS 2009) 2009 ACM New York 978-1-60558-894-0 199 212
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
34
-
-
84864680369
-
PriS methodology: Incorporating privacy requirements into the system design process
-
J. Mylopoulos, G. Spafford, IEEE CPS Paris, France
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis PriS methodology: incorporating privacy requirements into the system design process J. Mylopoulos, G. Spafford, Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference - Symposium on Requirements Engineering for Information Security August 2005 IEEE CPS Paris, France
-
(2005)
Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference - Symposium on Requirements Engineering for Information Security
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
35
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis Addressing privacy requirements in system design: the PriS method Requir. Eng. J. 13 3 2008 241 255
-
(2008)
Requir. Eng. J.
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
36
-
-
84864709485
-
PRIS tool: A case tool for privacy-oriented Requirements Engineering
-
AIS SIGSEC (University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21/11/2003, Samos)
-
C. Kalloniatis, E. Kavakli, and E. Kontellis PRIS tool: a case tool for privacy-oriented Requirements Engineering Journal of Information Systems Security vol. 6, No. 1 2010 AIS SIGSEC 3 19 (University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21/11/2003, Samos)
-
(2010)
Journal of Information Systems Security
, vol.61
, pp. 3-19
-
-
Kalloniatis, C.1
Kavakli, E.2
Kontellis, E.3
-
37
-
-
33646358507
-
Incorporating privacy requirements into the system design process: The PriS conceptual framework
-
E. Kavakli, C. Kalloniatis, P. Loucopoulos, and S. Gritzalis Incorporating privacy requirements into the system design process: the PriS conceptual framework Internet Research, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice vol. 16, No 2 2006 140 158
-
(2006)
Internet Research, Special Issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice
, vol.162
, pp. 140-158
-
-
Kavakli, E.1
Kalloniatis, C.2
Loucopoulos, P.3
Gritzalis, S.4
-
39
-
-
77950516884
-
-
Requirements Engineering Journal Springer-Verlag
-
S.H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec Requirements Engineering Journal 15(1) March 2010 Springer-Verlag 63 93
-
(2010)
Eliciting Security Requirements and Tracing Them to Design: An Integration of Common Criteria, Heuristics, and UMLsec
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
40
-
-
84894234827
-
"cloud security and privacy: What is the data life cycle?"
-
(Last access 29/10/2012)
-
"Cloud security and privacy: what is the data life cycle?" Programming 4 Us 2010 http://mscerts.programming4.us/ (Last access 29/10/2012)
-
(2010)
Programming 4 Us
-
-
-
44
-
-
3843125737
-
Rechsicherheit trotz Anonymität in offenen digitalen Systemen
-
(Part 1, No. 7 305-315 Part 2)
-
B. Pfitzmann, M. Waidner, and A. Pfitzmann Rechsicherheit trotz Anonymität in offenen digitalen Systemen Datenschutz Datensicherheit (DuD) 6 1990 243 253 (Part 1, No. 7 305-315 Part 2)
-
(1990)
Datenschutz Datensicherheit (DuD)
, vol.6
, pp. 243-253
-
-
Pfitzmann, B.1
Waidner, M.2
Pfitzmann, A.3
-
48
-
-
70849084080
-
Methods for designing privacy aware information systems: A review
-
V. Chrysikopoulos, N. Alexandris, C. Douligeris, S. Sioutas, IEEE CPS Conference Publishing Services Corfu, Greece
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis Methods for designing privacy aware information systems: a review V. Chrysikopoulos, N. Alexandris, C. Douligeris, S. Sioutas, Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics September 2009 IEEE CPS Conference Publishing Services Corfu, Greece 185 194
-
(2009)
Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics
, pp. 185-194
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
49
-
-
77955462130
-
Toward a framework to elicit and manage security and privacy requirements from laws and regulation
-
Lecture Notes in Computer Science
-
S. Islam, H. Mouratidis, and S. Wagner Toward a framework to elicit and manage security and privacy requirements from laws and regulation Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ) Lecture Notes in Computer Science vol. 6182/2010 2010 255 261
-
(2010)
Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ)
, vol.6182
, Issue.2010
, pp. 255-261
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
|