메뉴 건너뛰기




Volumn 36, Issue 4, 2014, Pages 759-775

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts

Author keywords

Cloud computing; Concepts; Privacy; Requirements; Security; Security and privacy issues

Indexed keywords


EID: 84894259408     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2013.12.010     Document Type: Article
Times cited : (59)

References (53)
  • 3
    • 79952065844 scopus 로고    scopus 로고
    • (Retrieved 2012-09-22 Last access 09/01/2013)
    • Cloud Security Alliance Top threats to cloud computing V1.0 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf (Retrieved 2012-09-22 Last access 09/01/2013)
    • Top Threats to Cloud Computing V1.0
    • Security Alliance, C.1
  • 4
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 8
    • 84866253432 scopus 로고    scopus 로고
    • Aligning security and privacy to support the development of secure information systems
    • H. Mouratidis, C. Kalloniatis, S. Islam, M.P. Huget, and S. Gritzalis Aligning security and privacy to support the development of secure information systems J. Univ. Comput. Sci. 18 12 2012 1608 1627
    • (2012) J. Univ. Comput. Sci. , vol.18 , Issue.12 , pp. 1608-1627
    • Mouratidis, H.1    Kalloniatis, C.2    Islam, S.3    Huget, M.P.4    Gritzalis, S.5
  • 10
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requir. Eng. J. 10 1 2005 34 44
    • (2005) Requir. Eng. J. , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 15
    • 71749105371 scopus 로고    scopus 로고
    • Assessing the Security Risks of Cloud Computing
    • Gartner Group (ID Number: G00157782 Last access 09/01/2013)
    • J. Heiser, and M. Nicolett Assessing the Security Risks of Cloud Computing white paper 2008 Gartner Group (ID Number: G00157782 Last access 09/01/2013)
    • (2008) White Paper
    • Heiser, J.1    Nicolett, M.2
  • 20
    • 84894229610 scopus 로고    scopus 로고
    • Jeff Bezos' Risky Bet", Business Week, (Last access 09/01/2013)
    • "Jeff Bezos' Risky Bet", Business Week, http://www. businessweek.com/stories/2006-11-12/jeff-bezos-risky-bet, (Last access 09/01/2013).
  • 21
    • 84894287583 scopus 로고    scopus 로고
    • King, Rachael, Cloud computing: small companies take flight, Businessweek. (Last access 09/12/2012)
    • King, Rachael, Cloud computing: small companies take flight, http://www.businessweek.com/stories/2008-08-04/cloud-computing-small-companies- take-flightbusinessweek-business-news-stock-market-and-financial-advice Businessweek. (Last access 09/12/2012).
  • 22
    • 84894274416 scopus 로고    scopus 로고
    • Defining and Measuring Cloud Elasticity, KIT Software Quality Departement. (Last access 13/08/2012)
    • Defining and Measuring Cloud Elasticity, KIT Software Quality Departement. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000023476. (Last access 13/08/2012).
  • 23
    • 84894232988 scopus 로고    scopus 로고
    • Of Cloud Scale Infrastructure E. Cloud Slam (Last access 13/05/2012)
    • Economies of Cloud Scale Infrastructure 2011 Cloud Slam (Last access 13/05/2012)
    • (2011)
  • 24
    • 84894258487 scopus 로고    scopus 로고
    • Farber, Dan. The new geek chic: data centers. CNET News. (Last access 22/08/2012)
    • Farber, Dan. The new geek chic: data centers. http://news.cnet.com/8301- 13953-3-9977049-80.html CNET News. (Last access 22/08/2012).
  • 25
    • 44649122227 scopus 로고    scopus 로고
    • Guidelines for performing systematic literature reviews in software engineering, version 2.3
    • University of Keele and Durham University
    • B. Kitchenham, and S. Charters Guidelines for performing systematic literature reviews in software engineering, version 2.3 EBSE Technical Report 2007 University of Keele and Durham University
    • (2007) EBSE Technical Report
    • Kitchenham, B.1    Charters, S.2
  • 27
    • 80052421239 scopus 로고    scopus 로고
    • A case for hardware protection of guest VMs from compromised hypervisors in cloud computing
    • J. Szefer, and R.B. Lee A case for hardware protection of guest VMs from compromised hypervisors in cloud computing ICDCS Workshops 2011 248 252
    • (2011) ICDCS Workshops , pp. 248-252
    • Szefer, J.1    Lee, R.B.2
  • 35
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • C. Kalloniatis, E. Kavakli, and S. Gritzalis Addressing privacy requirements in system design: the PriS method Requir. Eng. J. 13 3 2008 241 255
    • (2008) Requir. Eng. J. , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 36
    • 84864709485 scopus 로고    scopus 로고
    • PRIS tool: A case tool for privacy-oriented Requirements Engineering
    • AIS SIGSEC (University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21/11/2003, Samos)
    • C. Kalloniatis, E. Kavakli, and E. Kontellis PRIS tool: a case tool for privacy-oriented Requirements Engineering Journal of Information Systems Security vol. 6, No. 1 2010 AIS SIGSEC 3 19 (University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21/11/2003, Samos)
    • (2010) Journal of Information Systems Security , vol.61 , pp. 3-19
    • Kalloniatis, C.1    Kavakli, E.2    Kontellis, E.3
  • 40
    • 84894234827 scopus 로고    scopus 로고
    • "cloud security and privacy: What is the data life cycle?"
    • (Last access 29/10/2012)
    • "Cloud security and privacy: what is the data life cycle?" Programming 4 Us 2010 http://mscerts.programming4.us/ (Last access 29/10/2012)
    • (2010) Programming 4 Us
  • 44
    • 3843125737 scopus 로고
    • Rechsicherheit trotz Anonymität in offenen digitalen Systemen
    • (Part 1, No. 7 305-315 Part 2)
    • B. Pfitzmann, M. Waidner, and A. Pfitzmann Rechsicherheit trotz Anonymität in offenen digitalen Systemen Datenschutz Datensicherheit (DuD) 6 1990 243 253 (Part 1, No. 7 305-315 Part 2)
    • (1990) Datenschutz Datensicherheit (DuD) , vol.6 , pp. 243-253
    • Pfitzmann, B.1    Waidner, M.2    Pfitzmann, A.3
  • 48
    • 70849084080 scopus 로고    scopus 로고
    • Methods for designing privacy aware information systems: A review
    • V. Chrysikopoulos, N. Alexandris, C. Douligeris, S. Sioutas, IEEE CPS Conference Publishing Services Corfu, Greece
    • C. Kalloniatis, E. Kavakli, and S. Gritzalis Methods for designing privacy aware information systems: a review V. Chrysikopoulos, N. Alexandris, C. Douligeris, S. Sioutas, Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics September 2009 IEEE CPS Conference Publishing Services Corfu, Greece 185 194
    • (2009) Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics , pp. 185-194
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 49
    • 77955462130 scopus 로고    scopus 로고
    • Toward a framework to elicit and manage security and privacy requirements from laws and regulation
    • Lecture Notes in Computer Science
    • S. Islam, H. Mouratidis, and S. Wagner Toward a framework to elicit and manage security and privacy requirements from laws and regulation Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ) Lecture Notes in Computer Science vol. 6182/2010 2010 255 261
    • (2010) Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ) , vol.6182 , Issue.2010 , pp. 255-261
    • Islam, S.1    Mouratidis, H.2    Wagner, S.3
  • 50
    • 77950519059 scopus 로고    scopus 로고
    • Evaluating existing security and privacy requirements for legal compliance
    • Springer-Verlag
    • A.K. Massey, P.N. Otto, L.J. Hayward, and A.I. Antón Evaluating existing security and privacy requirements for legal compliance Requirements Engineering Journal vol. 15, No1 2010 Springer-Verlag
    • (2010) Requirements Engineering Journal , vol.151
    • Massey, A.K.1    Otto, P.N.2    Hayward, L.J.3    Antón, A.I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.