메뉴 건너뛰기




Volumn 9783642385865, Issue , 2013, Pages 73-102

Adaptive security management in SaaS applications

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE SECURITY; BENEFIT/COST; CLOUD-COMPUTING; COMPUTING MODEL; COST SAVING; POTENTIAL BENEFITS; SECURITY MANAGEMENT; SOFTWARE INFRASTRUCTURE;

EID: 84929688744     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-642-38586-5_3     Document Type: Chapter
Times cited : (5)

References (47)
  • 1
    • 77955959213 scopus 로고    scopus 로고
    • European Network, Information Security Agency (ENISA) Accessed on July 2010
    • European Network and Information Security Agency (ENISA) (2009) Cloud computing: benefits, risks and recommendations for information security. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment. Accessed on July 2010
    • (2009) Cloud computing: Benefits, risks and recommendations for information security
  • 2
    • 80053154308 scopus 로고    scopus 로고
    • International Data Corporation Accessed on July 2010
    • International Data Corporation (2010) IDC ranking of issues of cloud computing model. http://blogs.idc.com/ie/?p=210. Accessed on July 2010
    • (2010) IDC Ranking of Issues of Cloud Computing Model
  • 5
    • 85193190256 scopus 로고    scopus 로고
    • National Institute of standards and technology (NIST) The federal information security management act (FISMA), U.S. Government Printing Washington Accessed on Aug 2010
    • National Institute of standards and technology (NIST) The federal information security management act (FISMA), U.S. Government Printing 2002, Washington. http://csrc.nist.gov/drivers/documents/FISMA-final.pdf. Accessed on Aug 2010
    • (2002)
  • 7
    • 57649090183 scopus 로고    scopus 로고
    • Information security management standards: Compliance, governance and risk management
    • Humphreys E (2008) Information security management standards: compliance, governance and risk management. Inf Sec Tech Rep 13:247-255
    • (2008) Inf Sec Tech Rep , vol.13 , pp. 247-255
    • Humphreys, E.1
  • 8
    • 84864759284 scopus 로고    scopus 로고
    • Information systems security management: A review and a classification of the ISO standards
    • Sideridis A, Patrikakis C (eds) Springer, Berlin
    • Tsohou A, Kokolakis S, Lambrinoudakis C, Gritzalis S (2010) Information systems security management: a review and a classification of the ISO standards. In: Sideridis A, Patrikakis C (eds) Next generation society. Technological and legal issues. Springer, Berlin, pp 220-235
    • (2010) Next Generation Society. Technological and Legal Issues , pp. 220-235
    • Tsohou, A.1    Kokolakis, S.2    Lambrinoudakis, C.3    Gritzalis, S.4
  • 9
    • 48749122736 scopus 로고    scopus 로고
    • A target-centric formal model for insider threat and more
    • University of Buffalo, US2004
    • Chinchani R, Iyer A, Ngo H, Upadhyaya S (2004) A target-centric formal model for insider threat and more. Technical Report 2004-16, University of Buffalo, US2004
    • (2004) Technical Report , pp. 2004-2016
    • Chinchani, R.1    Iyer, A.2    Ngo, H.3    Upadhyaya, S.4
  • 12
    • 85076884574 scopus 로고    scopus 로고
    • MulVAL: A logic-based network security analyzer
    • Presented at the MD, USA, August, Baltimore
    • Ou X, Govindavajhala S, AppelAW(2005) MulVAL: a logic-based network security analyzer. Presented at the 14th USENIX security symposium, MD, USA, August, Baltimore
    • (2005) 14th USENIX Security Symposium
    • Ou, X.1    Govindavajhala, S.2    Appel, A.W.3
  • 30
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G, Opdahl A (2005) Eliciting security requirements with misuse cases. Requirements Eng 10:34-44
    • (2005) Requirements Eng , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 31
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • Springer, Berlin
    • Jürjens J (2001) Towards development of secure systems using UMLsec. In: Fundamental approaches to software engineering, vol 2029. Springer, Berlin, pp 187-200
    • (2001) Fundamental Approaches to Software Engineering , vol.2029 , pp. 187-200
    • Jürjens, J.1
  • 43
    • 80052254325 scopus 로고    scopus 로고
    • Bayuk J (2011) Cloud security metrics. In: 2011 6th international conference on system of systems engineering (SoSE), pp 341-345
    • (2011) Cloud security metrics , pp. 341-345
    • Bayuk, J.1
  • 44
    • 85193173740 scopus 로고    scopus 로고
    • NIST Concept of Operations (CONOPS)-FedRAMP NIST2012
    • NIST Concept of Operations (CONOPS)-FedRAMP NIST2012
  • 45
    • 85193167257 scopus 로고    scopus 로고
    • MitreCorporation
    • Available at
    • MitreCorporation (2010) Making security measurable.Available at http://measurablesecurity. mitre.org/
    • (2010) Making Security Measurable
  • 46
    • 59449108823 scopus 로고    scopus 로고
    • National Institute of Standards and Technology-NIST Available at
    • National Institute of Standards and Technology-NIST (2010) National vulnerabilities database home. Available at http://nvd.nist.gov/
    • (2010) National Vulnerabilities Database Home
  • 47
    • 70349742463 scopus 로고    scopus 로고
    • Self-adaptive software: Landscape and research challenges
    • Salehie M, Tahvildari L (2009) Self-adaptive software: landscape and research challenges. ACM Trans Auton Adapt Syst 4:1-42
    • (2009) ACM Trans Auton Adapt Syst , vol.4 , pp. 1-42
    • Salehie, M.1    Tahvildari, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.