메뉴 건너뛰기




Volumn , Issue , 2014, Pages 337-342

A catalog of security requirements patterns for the domain of cloud computing systems

Author keywords

Cloud computing; ISO 27001; Requirements elicitation; Requirements patterns; Security requirements; Security standards

Indexed keywords

COMPUTATION THEORY;

EID: 84905648505     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2554850.2554921     Document Type: Conference Paper
Times cited : (26)

References (19)
  • 1
    • 84903137946 scopus 로고    scopus 로고
    • A pattern-based method for establishing a cloud-specific information security management system
    • K. Beckers, I. Côté, S. Faßbender, M. Heisel, and S. Hofbauer. A pattern-based method for establishing a cloud-specific information security management system. Requirements Engineering, pages 1-53, 2013.
    • (2013) Requirements Engineering , pp. 1-53
    • Beckers, K.1    Côté, I.2    Faßbender, S.3    Heisel, M.4    Hofbauer, S.5
  • 7
    • 77954695824 scopus 로고    scopus 로고
    • Cloud Security Alliance (CSA) March
    • Cloud Security Alliance (CSA). Top threats to cloud computing, March 2010.
    • (2010) Top Threats to Cloud Computing
  • 14
    • 52149110782 scopus 로고    scopus 로고
    • Combining domain-driven approach with requirement assets for networked software requirements elicitation
    • Washington, DC, USA IEEE Computer Society
    • W. Liu, K.-Q. He, K. Zhang, and J. Wang. Combining domain-driven approach with requirement assets for networked software requirements elicitation. In Proceedings of the 2008 IEEE International Conference on Semantic Computing, ICSC '08, pages 354-361, Washington, DC, USA, 2008. IEEE Computer Society.
    • (2008) Proceedings of the 2008 IEEE International Conference on Semantic Computing, ICSC '08 , pp. 354-361
    • Liu, W.1    He, K.-Q.2    Zhang, K.3    Wang, J.4
  • 16
    • 77954051808 scopus 로고    scopus 로고
    • Effectively and securely using the cloud-computing paradigm
    • NIST presentation at
    • P. Mell and T. Grance. Effectively and Securely Using the Cloud-Computing Paradigm. NIST, 2009. presentation at NIST.
    • (2009) NIST
    • Mell, P.1    Grance, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.