-
1
-
-
77955959213
-
-
European Network, Information Security Agency (ENISA) Accessed on July 2010
-
European Network and Information Security Agency (ENISA) (2009) Cloud computing: benefits, risks and recommendations for information security. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment. Accessed on July 2010
-
(2009)
Cloud computing: Benefits, risks and recommendations for information security
-
-
-
2
-
-
80053154308
-
-
International Data Corporation Accessed on July 2010
-
International Data Corporation (2010) IDC ranking of issues of cloud computing model. http://blogs.idc.com/ie/?p=210. Accessed on July 2010
-
(2010)
IDC Ranking of Issues of Cloud Computing Model
-
-
-
4
-
-
77953032795
-
SLA perspective in security management for cloud computing
-
Chaves SAD, Westphall CB, Lamin FR (2010) SLA perspective in security management for cloud computing. In: Sixth international conference on networking and services, Cancun, Mexico, pp 212-217
-
(2010)
Sixth International Conference on Networking and Services, Cancun, Mexico
, pp. 212-217
-
-
Sad, C.1
Westphall, C.B.2
Lamin, F.R.3
-
5
-
-
85193190256
-
-
National Institute of standards and technology (NIST) The federal information security management act (FISMA), U.S. Government Printing Washington Accessed on Aug 2010
-
National Institute of standards and technology (NIST) The federal information security management act (FISMA), U.S. Government Printing 2002, Washington. http://csrc.nist.gov/drivers/documents/FISMA-final.pdf. Accessed on Aug 2010
-
(2002)
-
-
-
7
-
-
57649090183
-
Information security management standards: Compliance, governance and risk management
-
Humphreys E (2008) Information security management standards: compliance, governance and risk management. Inf Sec Tech Rep 13:247-255
-
(2008)
Inf Sec Tech Rep
, vol.13
, pp. 247-255
-
-
Humphreys, E.1
-
8
-
-
84864759284
-
Information systems security management: A review and a classification of the ISO standards
-
Sideridis A, Patrikakis C (eds) Springer, Berlin
-
Tsohou A, Kokolakis S, Lambrinoudakis C, Gritzalis S (2010) Information systems security management: a review and a classification of the ISO standards. In: Sideridis A, Patrikakis C (eds) Next generation society. Technological and legal issues. Springer, Berlin, pp 220-235
-
(2010)
Next Generation Society. Technological and Legal Issues
, pp. 220-235
-
-
Tsohou, A.1
Kokolakis, S.2
Lambrinoudakis, C.3
Gritzalis, S.4
-
9
-
-
48749122736
-
A target-centric formal model for insider threat and more
-
University of Buffalo, US2004
-
Chinchani R, Iyer A, Ngo H, Upadhyaya S (2004) A target-centric formal model for insider threat and more. Technical Report 2004-16, University of Buffalo, US2004
-
(2004)
Technical Report
, pp. 2004-2016
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.3
Upadhyaya, S.4
-
10
-
-
44049089202
-
Automated generation and analysis of attack graphs Security and privacy 2002
-
Sheyner O, Haines J, Jha S, Lippmann R, Wing JM(2002) Automated generation and analysis of attack graphs. In: Security and privacy, 2002. Proceedings. 2002 IEEE Symposium on, pp 273-284
-
(2002)
Proceedings. 2002 IEEE Symposium on
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
12
-
-
85076884574
-
MulVAL: A logic-based network security analyzer
-
Presented at the MD, USA, August, Baltimore
-
Ou X, Govindavajhala S, AppelAW(2005) MulVAL: a logic-based network security analyzer. Presented at the 14th USENIX security symposium, MD, USA, August, Baltimore
-
(2005)
14th USENIX Security Symposium
-
-
Ou, X.1
Govindavajhala, S.2
Appel, A.W.3
-
16
-
-
77953775928
-
Software vulnarabilities, prevention and detection methods: A review
-
Enschede, The Netherlands
-
Jimenez W, Mammar A, Cavalli A (2009) Software vulnarabilities, prevention and detection methods: a review. In: Proceedings of European workshop on security in model driven architecture, Enschede, The Netherlands, pp 6-13
-
(2009)
Proceedings of European Workshop on Security in Model Driven Architecture
, pp. 6-13
-
-
Jimenez, W.1
Mammar, A.2
Cavalli, A.3
-
18
-
-
34547379435
-
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks
-
Oregon, USA
-
Halfond WGJ, Orso A, Manolios P (2006) Using positive tainting and syntax-aware evaluation to counter SQL injection attacks. In: Proceedings of 14th ACM SIGSOFT international symposium on Foundations of software engineering, Oregon, USA, pp 175-185
-
(2006)
Proceedings of 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 175-185
-
-
Wgj, H.1
Orso, A.2
Manolios, P.3
-
20
-
-
31744432699
-
Finding application errors and security flaws using PQL: A program query language
-
MartinM, Livshits B, LamMS (2005) Finding application errors and security flaws using PQL: a program query language. In: Proceedings of the 20th annual ACMSIGPLAN conference on object-oriented programming, systems, languages, and applications CA, USA, pp 365-383
-
(2005)
Proceedings of the 20th Annual ACMSIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications CA, USA
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
21
-
-
77950880816
-
Securing web applications with static and dynamic information flow tracking
-
Lam MS, Martin M, Livshits B, Whaley J (2008) Securing web applications with static and dynamic information flow tracking. In: Proceedings of (2008) ACM SIGPLAN symposium on partial evaluation and semantics-based program manipulation, California, USA, pp 3-12
-
(2008)
Proceedings of (2008) ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, California, USA
, pp. 3-12
-
-
Lam, M.S.1
Martin, M.2
Livshits, B.3
Whaley, J.4
-
24
-
-
79960350209
-
HAMPI: A string solver for testing, analysis and vulnerability detection
-
Snowbird, UT
-
GaneshV, Kie?zunA, Artzi S, Guo PJ, Hooimeijer P, ErnstM(2011) HAMPI: a string solver for testing, analysis and vulnerability detection. In: Proceedings of 23rd international conference on Computer aided verification, Snowbird, UT, pp 1-19
-
(2011)
Proceedings of 23rd International Conference on Computer Aided Verification
, pp. 1-19
-
-
Ganesh, V.1
Kiezun, A.2
Artzi, S.3
Guo, P.J.4
Hooimeijer, P.5
Ernst, M.6
-
25
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
Kieyzun A, Guo PJ, Jayaraman K, Ernst MD (2009) Automatic creation of SQL injection and cross-site scripting attacks. In: Proceedings of 31st international conference on, software engineering, pp 199-209
-
(2009)
Proceedings of 31st International Conference On, Software Engineering
, pp. 199-209
-
-
Kieyzun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
27
-
-
34250673645
-
SecuBat: A web vulnerability scanner
-
Presented at the Edinburgh, Scotland
-
Kals S, Kirda E, Kruegel C, Jovanovic N (2006) SecuBat: a web vulnerability scanner. Presented at the proceedings of 15th international conference on World Wide Web, Edinburgh, Scotland
-
(2006)
Proceedings of 15th International Conference on World Wide Web
-
-
Kals, S.1
Kirda, E.2
Kruegel, C.3
Jovanovic, N.4
-
28
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
Balzarotti D, Cova M, Felmetsger V, Jovanovic N, Kirda E, Kruegel C, Vigna G (2008) Saner: composing static and dynamic analysis to validate sanitization in web applications. In: Proceedings of 2008 IEEE symposium on security and privacy, pp 387-401
-
(2008)
Proceedings of 2008 IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
30
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G, Opdahl A (2005) Eliciting security requirements with misuse cases. Requirements Eng 10:34-44
-
(2005)
Requirements Eng
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.2
-
31
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
Springer, Berlin
-
Jürjens J (2001) Towards development of secure systems using UMLsec. In: Fundamental approaches to software engineering, vol 2029. Springer, Berlin, pp 187-200
-
(2001)
Fundamental Approaches to Software Engineering
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
-
32
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Lodderstedt T, Basin D, Doser J (2002) SecureUML: a UML-based modeling language for model-driven security. In: The 5th international conference on the Unified Modeling Language, Dresden, Germany, pp 426-441
-
(2002)
The 5th International Conference on the Unified Modeling Language, Dresden, Germany
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
36
-
-
78649790488
-
Security-drivenmodelbased dynamic adaptation
-
Presented at the the Antwerp, Belgium
-
Morin B, MouelhiT, Fleurey F, LeTraonY, BaraisO, Jézéquel J (2010) Security-drivenmodelbased dynamic adaptation. Presented at the the 25nd IEEE/ACM international conference on automated software engineering, Antwerp, Belgium
-
(2010)
25nd IEEE/ACM International Conference on Automated Software Engineering
-
-
Morin, B.1
Mouelhit Fleurey, F.2
Baraiso, L.3
Jézéquel, J.4
-
38
-
-
49949083649
-
A framework for native multi-tenancy application development and management
-
CEC/EEE 2007. The 9th IEEE international conference on
-
Guo CJ, Sun W, Huang Y, Wang ZH, Gao B (2007) A framework for native multi-tenancy application development and management. In: E-Commerce technology and the 4th IEEE international conference on enterprise computing, E-Commerce, and E-Services, 2007. CEC/EEE 2007. The 9th IEEE international conference on, pp 551-558
-
(2007)
E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services
, vol.2007
, pp. 551-558
-
-
Guo, C.J.1
Sun, W.2
Huang, Y.3
Zh, W.4
Gao, B.5
-
39
-
-
77952651389
-
Multi-tenant, secure, load disseminated SaaS architecture
-
Gangwon-Do, South Korea
-
Pervez Z, Lee S, LeeY-K(2010) Multi-tenant, secure, load disseminated SaaS architecture. In: 12th international conference on advanced communication technology, Gangwon-Do, South Korea, pp 214-219
-
(2010)
12th International Conference on Advanced Communication Technology
, pp. 214-219
-
-
Pervez, Z.1
Lee, S.2
Lee, Y.-K.3
-
40
-
-
78049341379
-
The service security lab: A model-driven platform to compose and explore service security in the cloud
-
Menzel M, Warschofsky R, Thomas I, Willems C, Meinel C (2010) The service security lab: a model-driven platform to compose and explore service security in the cloud. In: 2010 6th World Congress on Services (SERVICES-1), pp 115-122
-
(2010)
2010 6th World Congress on Services (SERVICES-1)
, pp. 115-122
-
-
Menzel, M.1
Warschofsky, R.2
Thomas, I.3
Willems, C.4
Meinel, C.5
-
43
-
-
80052254325
-
-
Bayuk J (2011) Cloud security metrics. In: 2011 6th international conference on system of systems engineering (SoSE), pp 341-345
-
(2011)
Cloud security metrics
, pp. 341-345
-
-
Bayuk, J.1
-
44
-
-
85193173740
-
-
NIST Concept of Operations (CONOPS)-FedRAMP NIST2012
-
NIST Concept of Operations (CONOPS)-FedRAMP NIST2012
-
-
-
-
45
-
-
85193167257
-
MitreCorporation
-
Available at
-
MitreCorporation (2010) Making security measurable.Available at http://measurablesecurity. mitre.org/
-
(2010)
Making Security Measurable
-
-
-
46
-
-
59449108823
-
-
National Institute of Standards and Technology-NIST Available at
-
National Institute of Standards and Technology-NIST (2010) National vulnerabilities database home. Available at http://nvd.nist.gov/
-
(2010)
National Vulnerabilities Database Home
-
-
-
47
-
-
70349742463
-
Self-adaptive software: Landscape and research challenges
-
Salehie M, Tahvildari L (2009) Self-adaptive software: landscape and research challenges. ACM Trans Auton Adapt Syst 4:1-42
-
(2009)
ACM Trans Auton Adapt Syst
, vol.4
, pp. 1-42
-
-
Salehie, M.1
Tahvildari, L.2
|