메뉴 건너뛰기




Volumn 50, Issue , 2015, Pages 60-73

Selecting a trusted cloud service provider for your SaaS program

Author keywords

Auditability; Cloud security; Function; Governability; Interoperability; SaaS; Security assurance; Software as a service; Trusted cloud services

Indexed keywords

DISTRIBUTED DATABASE SYSTEMS; FUNCTIONS; INTEROPERABILITY; MOBILE SECURITY; WEB SERVICES;

EID: 84924355619     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2015.02.001     Document Type: Article
Times cited : (61)

References (22)
  • 1
    • 84924418245 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.16.14]
    • Bell Assessing the security of cloud service providers 2013 Available at: http://www.bell.ca/enterprise/portlets/enterprise/documentform/core-content-downloads.jsp?FormId=CloudProviderSecurityAbilities&language=en [Last accessed: 08.16.14]
    • (2013) Assessing the Security of Cloud Service Providers
  • 2
    • 84924410314 scopus 로고    scopus 로고
    • Available at: [Last accessed: 07.14.14]
    • CCToffice Security benefits of cloud computing 2013 Available at: http://cctoffice.com/2013/03/security-benefits-of-cloud-computing [Last accessed: 07.14.14]
    • (2013) Security Benefits of Cloud Computing
  • 3
    • 84924379858 scopus 로고    scopus 로고
    • Available at: [Last accessed 08.15.14]
    • ChangeWave Research Reasons why companies are not using the cloud 2013 Available at: http://changewaveresearch.com/our-research/corporate [Last accessed 08.15.14]
    • (2013) Reasons Why Companies Are Not Using the Cloud
  • 4
    • 84886731331 scopus 로고    scopus 로고
    • Last accessed: 08.14.14
    • Cloud Security Alliance The notorious nine: cloud computing top threats in 2013 2013 https://cloudsecurityalliance.org/download/the-notorious-nine-cloud-computing-top-threats-in-2013 [Last accessed: 08.14.14]
    • (2013) The Notorious Nine: Cloud Computing Top Threats in 2013
  • 5
    • 84924361481 scopus 로고    scopus 로고
    • Last accessed: 08.16.14
    • Cloud Security Alliance Cloud controls matrix v.3.0 2013 https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3 [Last accessed: 08.16.14]
    • (2013) Cloud Controls Matrix v.3.0
  • 6
    • 84919771672 scopus 로고    scopus 로고
    • Available at: cloud security unfettered access to essential audit information [Last accessed: 08.16.14]
    • Cloud-Council Security for cloud computing 10 steps to ensure success Available at: 2012 cloud security unfettered access to essential audit information www.cloud-council.org/Security-for-Cloud-Computing-Final-080912.pdf [Last accessed: 08.16.14]
    • (2012) Security for Cloud Computing 10 Steps to Ensure Success
  • 7
    • 84924357394 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.14.14]
    • CloudComputingAdmin Standards and good cloud practice 2014 Available at: http://www.cloudcomputingadmin.com/articles-tutorials/compliance-regulations/standards-and-good-cloud-practice.html [Last accessed: 08.14.14]
    • (2014) Standards and Good Cloud Practice
  • 8
    • 84924379857 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.14.14]
    • Dimension Data Cloud security: developing a secure cloud approach 2012 Available at: http://cloud.dimensiondata.com/am/en/about/resources/white-papers/cloud-security-developing-a-secure-cloud-approach [Last accessed: 08.14.14]
    • (2012) Cloud Security: Developing A Secure Cloud Approach
  • 9
    • 84924346313 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.16.14]
    • EY Building trust in the cloud 2014 Available at: http://www.ey.com/GL/en/Services/Advisory/Building-trust-in-the-cloud [Last accessed: 08.16.14]
    • (2014) Building Trust in the Cloud
  • 10
    • 84924415566 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.14.14]
    • HiMSS Top 10 cloud security concerns introduction and overview 2012 Available at: http://www.himss.org/ResourceLibrary/ResourceDetail.aspx?ItemNumber=10541 [Last accessed: 08.14.14]
    • (2012) Top 10 Cloud Security Concerns Introduction and Overview
  • 12
    • 84924379856 scopus 로고    scopus 로고
    • Available at: [Last accessed: 07.10.14]
    • Intel Intel's vision of the ongoing shift to cloud computing 2012 Available at: www.intel.com/Assets/PDF/whitepaper/wp-cloud-vision-xeon.pdf [Last accessed: 07.10.14]
    • (2012) Intel's Vision of the Ongoing Shift to Cloud Computing
  • 13
    • 84924425725 scopus 로고    scopus 로고
    • IEC. Available at: [Last accessed: 08.16.14]
    • ISO/IEC ISO/IEC 27001-information security management 2013 Available at: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm [Last accessed: 08.16.14]
    • (2013) ISO/IEC 27001-information Security Management
  • 14
    • 84924379855 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.16.14]
    • Jan Stafford Enterprise cloud services: who's responsible? 2013 Available at: http://searchaws.techtarget.com/opinion/Enterprise-cloud-services-Whos-responsible [Last accessed: 08.16.14]
    • (2013) Enterprise Cloud Services: Who's Responsible?
    • Stafford, J.1
  • 15
    • 84924363905 scopus 로고    scopus 로고
    • Available at: [Last accessed 08.15.14]
    • Joyent The compelling economics of cloud computing 2012 Available at: http://www.joyent.com/content/06-developers/01-resources/16-the-economics-of-cloud-computing/compelling-economics-cloud-computing.pdf [Last accessed 08.15.14]
    • (2012) The Compelling Economics of Cloud Computing
  • 16
    • 84893076097 scopus 로고    scopus 로고
    • Available at: [Last accessed 07.15.14]
    • KPMG The cloud changing the business ecosystem 2011 Available at: http://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Pages/TheCloud-ChangingtheBusinessEcosystem.aspx [Last accessed 07.15.14]
    • (2011) The Cloud Changing the Business Ecosystem
  • 17
    • 84951832849 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.16.14]
    • PCISSC PCI DSS v3.0 2013 Available at: https://www.pcisecuritystandards.org/security-standards/pcidss-agreement.php?association=pcidss [Last accessed: 08.16.14]
    • (2013) PCI DSS v3.0
    • PCISSC1
  • 19
    • 84924379852 scopus 로고    scopus 로고
    • Available at: [Last accessed: 07.10.14]
    • Reval SaaS technology: a medium for treasury change 2012 Available at: www.reval.com/reval%20knowledge%20source/RevalWhitePaper-12Mar12-SaaSTechnology.pdf [Last accessed: 07.10.14]
    • (2012) SaaS Technology: A Medium for Treasury Change
  • 20
    • 84924379851 scopus 로고    scopus 로고
    • Available at: [Last accessed: 07.18.14]
    • Samanage Smart questions for your SaaS vendor 2013 Available at: www.samanage.com/content/Smart-Questions-for-your-SaaS-vendor.pdf [Last accessed: 07.18.14]
    • (2013) Smart Questions for Your SaaS Vendor
  • 21
    • 84924379850 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.25.14]
    • The Open Group Cloud computing portability and interoperability 2014 Available at: http://www.opengroup.org/cloud/cloud/cloud-iop/cloud-port.htm [Last accessed: 08.25.14]
    • (2014) Cloud Computing Portability and Interoperability
  • 22
    • 84924379849 scopus 로고    scopus 로고
    • Available at: [Last accessed: 08.16.14]
    • Linlin Wu Automated SLA negotiation framework for cloud computing 2013 Available at: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6546098&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs-all.jsp%3Farnumber%3D6546098 [Last accessed: 08.16.14]
    • (2013) Automated SLA Negotiation Framework for Cloud Computing
    • Wu, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.