-
1
-
-
84903137946
-
A pattern-based method for establishing a cloud-specific information security management system
-
K. Beckers, I. Côté, S. Faßbender, M. Heisel, and S. Hofbauer. A pattern-based method for establishing a cloud-specific information security management system. Requirements Engineering, pages 1-53, 2013.
-
(2013)
Requirements Engineering
, pp. 1-53
-
-
Beckers, K.1
Côté, I.2
Faßbender, S.3
Heisel, M.4
Hofbauer, S.5
-
2
-
-
84892399229
-
Structured pattern-based security requirements elicitation for clouds
-
IEEE Computer Society
-
K. Beckers, I. Côté, L. Goeke, S. Güler, and M. Heisel. Structured pattern-based security requirements elicitation for clouds. In Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Secure Software Engineering (SecSE 2013), pages 465-474. IEEE Computer Society, 2013.
-
(2013)
Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Secure Software Engineering (SecSE 2013)
, pp. 465-474
-
-
Beckers, K.1
Côté, I.2
Goeke, L.3
Güler, S.4
Heisel, M.5
-
4
-
-
80455140374
-
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
-
IEEE Computer Society
-
K. Beckers, J.-C. Küster, S. Faßbender, and H. Schmidt. Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing. In Proceedings of the International Conference on Availability, Reliability and Security (ARES), pages 327-333. IEEE Computer Society, 2011.
-
(2011)
Proceedings of the International Conference on Availability, Reliability and Security (ARES)
, pp. 327-333
-
-
Beckers, K.1
Küster, J.-C.2
Faßbender, S.3
Schmidt, H.4
-
7
-
-
77954695824
-
-
Cloud Security Alliance (CSA) March
-
Cloud Security Alliance (CSA). Top threats to cloud computing, March 2010.
-
(2010)
Top Threats to Cloud Computing
-
-
-
11
-
-
77950536938
-
-
B. Fabian, S. Gürses, M. Heisel, T. Santen, and H. Schmidt. A comparison of security requirements engineering methods Requirements Engineering, 15(1):7-40, 2010.
-
(2010)
A Comparison of Security Requirements Engineering Methods Requirements Engineering
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gürses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
14
-
-
52149110782
-
Combining domain-driven approach with requirement assets for networked software requirements elicitation
-
Washington, DC, USA IEEE Computer Society
-
W. Liu, K.-Q. He, K. Zhang, and J. Wang. Combining domain-driven approach with requirement assets for networked software requirements elicitation. In Proceedings of the 2008 IEEE International Conference on Semantic Computing, ICSC '08, pages 354-361, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 IEEE International Conference on Semantic Computing, ICSC '08
, pp. 354-361
-
-
Liu, W.1
He, K.-Q.2
Zhang, K.3
Wang, J.4
-
16
-
-
77954051808
-
Effectively and securely using the cloud-computing paradigm
-
NIST presentation at
-
P. Mell and T. Grance. Effectively and Securely Using the Cloud-Computing Paradigm. NIST, 2009. presentation at NIST.
-
(2009)
NIST
-
-
Mell, P.1
Grance, T.2
-
17
-
-
84877978016
-
A catalogue of functional software requirement patterns for the domain of content management systems
-
ACM
-
C. Palomares, C. Quer, X. Franch, S. Renault, and C. Guerlain. A catalogue of functional software requirement patterns for the domain of content management systems. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, pages 1260-1265. ACM, 2013.
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13
, pp. 1260-1265
-
-
Palomares, C.1
Quer, C.2
Franch, X.3
Renault, S.4
Guerlain, C.5
|