-
2
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical report, Berkeley, 2009.
-
(2009)
Technical Report Berkeley
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
84903137946
-
A patternbased method for establishing a cloud-specific information security management system
-
K. Beckers, I. Côté, S. Fabbender, M. Heisel, and S. Hofbauer. A patternbased method for establishing a cloud-specific information security management system. Requirements Engineering, pages 1-53, 2013.
-
(2013)
Requirements Engineering
, pp. 1-53
-
-
Beckers, K.1
Côté, I.2
Fabbender, S.3
Heisel, M.4
Hofbauer, S.5
-
4
-
-
84905648505
-
A catalog of security requirements patterns for the domain of cloud computing Systems
-
Accepted for Publication
-
K. Beckers, I. Côté, and L. Goeke. A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems. In Proc. 29th Symposium on Applied Computing. ACM, 2014. Accepted for Publication.
-
(2014)
Proc. 29th Symposium on Applied Computing ACM
-
-
Beckers, K.1
Côté, I.2
Goeke, L.3
-
5
-
-
84892399229
-
Structured pattern-based security requirements elicitation for clouds
-
IEEE Computer Society
-
K. Beckers, I. Côté, L. Goeke, S. Güler, and M. Heisel. Structured pattern-based security requirements elicitation for clouds. In Proc. of the 7th Int. Workshop on Secure Software Engineering (SecSE), pages 465-474. IEEE Computer Society, 2013.
-
(2013)
Proc. of the 7th Int. Workshop on Secure Software Engineering (SecSE)
, pp. 465-474
-
-
Beckers, K.1
Côté, I.2
Goeke, L.3
Güler, S.4
Heisel, M.5
-
6
-
-
84908632947
-
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
-
Springer
-
K. Beckers, M. Heisel, B. Solhaug, and K. Stølen. ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. In Engineering Secure Future Internet Services, LNCS 8431, page 315344. Springer, 2014.
-
(2014)
Engineering Secure Future Internet Services, LNCS
, vol.8431
, pp. 315344
-
-
Beckers, K.1
Heisel, M.2
Solhaug, B.3
Stølen, K.4
-
7
-
-
80455140374
-
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
-
IEEE Computer Society
-
K. Beckers, J.-C. Küster, S. Fabbender, and H. Schmidt. Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing. In Proc. of the Int. Conf. on Availability, Reliability and Security (ARES), pages 327-333. IEEE Computer Society, 2011.
-
(2011)
Proc. of the Int. Conf. on Availability, Reliability and Security (ARES)
, pp. 327-333
-
-
Beckers, K.1
Küster, J.-C.2
Fabbender, S.3
Schmidt, H.4
-
10
-
-
77950536938
-
A comparison of security requirements engineering methods
-
B. Fabian, S. Gürses, M. Heisel, T. Santen, and H. Schmidt. A comparison of security requirements engineering methods. Requirements Engineering -Special Issue on Security Requirements Engineering, 15(1):7-40, 2010.
-
(2010)
Requirements Engineering -Special Issue on Security Requirements Engineering
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gürses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
11
-
-
80053500161
-
Discovering multidimensional correlations among regulatory requirements to understand risk
-
Sept
-
R. A. Gandhi and S. W. Lee. Discovering multidimensional correlations among regulatory requirements to understand risk. ACM Trans. Softw. Eng. Methodol., 20(4):16:1-16:37, Sept. 2011.
-
(2011)
ACM Trans. Softw. Eng. Methodol
, vol.20
, Issue.4
, pp. 161-1637
-
-
Gandhi, R.A.1
Lee, S.W.2
|