-
1
-
-
84937496342
-
-
Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0
-
Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 (2011)
-
(2011)
-
-
-
2
-
-
84937496343
-
-
European Commission, Unleashing the Potential of Cloud Computing in Europe. Communication from the commission to the European Parliament, the council, the European economic and social Committee and the Committee of the regions
-
European Commission, Unleashing the Potential of Cloud Computing in Europe. Communication from the commission to the European Parliament, the council, the European economic and social Committee and the Committee of the regions (2012)
-
(2012)
-
-
-
3
-
-
84937496344
-
A security approach for data migration in cloud computing
-
Kushwah, V.S., Saxena, A.: A security approach for data migration in cloud computing. Int. J. Sci. Res. Publ. 3(5) (2013)
-
(2013)
Int. J. Sci. Res. Publ
, vol.3
, Issue.5
-
-
Kushwah, V.S.1
Saxena, A.2
-
4
-
-
8444222126
-
Legacy system migration: A legacy data migration engine
-
Czech Republic, Brno
-
Wu, B., et al.: Legacy system migration: a legacy data migration engine. In: 17th International Database Conference (DATASEM 1997), pp. 129–138. Czech Republic, Brno (1997)
-
(1997)
17Th International Database Conference (DATASEM 1997)
, pp. 129-138
-
-
Wu, B.1
-
5
-
-
0033184720
-
Legacy information system migration: A brief review of problems
-
Bisbal, J., et al.: Legacy information system migration: a brief review of problems. Solutions Res. Issues 16(5), 103–111 (1999)
-
(1999)
Solutions Res. Issues
, vol.16
, Issue.5
, pp. 103-111
-
-
Bisbal, J.1
-
6
-
-
80455123513
-
-
Computer Science Department, Trinity College Dublin
-
Bisbal, J., Lawless, D., Richardson, R.: A Survey of Research into Legacy System Migration. Computer Science Department, Trinity College Dublin (1997)
-
(1997)
A Survey of Research into Legacy System Migration
-
-
Bisbal, J.1
Lawless, D.2
Richardson, R.3
-
7
-
-
84937496345
-
-
PwC, The Future of IT Outsourcing and Cloud Computing
-
PwC, The Future of IT Outsourcing and Cloud Computing (2011)
-
(2011)
-
-
-
8
-
-
84937496346
-
-
Cloud Computing Use Case Discussion Group, Cloud Computing Use Cases White Paper version 4.0
-
Cloud Computing Use Case Discussion Group, Cloud Computing Use Cases White Paper version 4.0 (2010)
-
(2010)
-
-
-
9
-
-
84937440609
-
Security in legacy systems migration to the cloud: A systematic mapping study
-
Lisbon, Portugal
-
Alcañiz, L.M., et al.: Security in legacy systems migration to the cloud: a systematic mapping study. In: 11th International Workshop on Security in Information Systems, pp. 93–100. Lisbon, Portugal (2014)
-
(2014)
11Th International Workshop on Security in Information Systems
, pp. 93-100
-
-
Alcañiz, L.M.1
-
10
-
-
84881477485
-
Security analysis in the migration to cloud environments
-
Rosado, D.G., et al.: Security analysis in the migration to cloud environments. Future Internet 4, 469–487 (2012)
-
(2012)
Future Internet
, vol.4
, pp. 469-487
-
-
Rosado, D.G.1
-
11
-
-
84937429968
-
-
(eds.), Addison-Wesley Professional
-
Seacord, R., Plakosh, D., Lewis, G. (eds.): Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices, Addison-Wesley Professional, p. 352 (2003)
-
(2003)
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
, pp. 352
-
-
Seacord, R.1
Plakosh, D.2
Lewis, G.3
-
12
-
-
84937496347
-
-
OMG, Architecture-Driven Modernization. Knowledge Discovery Meta-Model (KDM), v1.3
-
OMG, Architecture-Driven Modernization. Knowledge Discovery Meta-Model (KDM), v1.3 (2011)
-
(2011)
-
-
-
13
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)
-
(2007)
Int. J. Softw. Eng. Knowl. Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
14
-
-
84937496348
-
-
Cloud Security Alliance. CSA Security, Trust & Assurance Registry (STAR)
-
Cloud Security Alliance. CSA Security, Trust & Assurance Registry (STAR) (2014). https://cloudsecurityalliance.org/star/
-
(2014)
-
-
-
15
-
-
79957875163
-
Knowledge discovery metamodel-ISO/IEC 19506: A standard to modernize legacy systems
-
Pérez-Castillo, R., García-Rodríguez de Guzmán, I., Piattini, M.: Knowledge discovery metamodel-ISO/IEC 19506: a standard to modernize legacy systems. Comput. Stand. Interfaces 33, 519–532 (2011)
-
(2011)
Comput. Stand. Interfaces
, vol.33
, pp. 519-532
-
-
Pérez-Castillo, R.1
de García-Rodríguez Guzmán, I.2
Piattini, M.3
-
17
-
-
84900002114
-
Modisco: A model driven reverse engineering framework
-
Bruneliere, H., et al.: Modisco: a model driven reverse engineering framework. Inf. Softw. Technol. 56(8), 1012–1032 (2014)
-
(2014)
Inf. Softw. Technol
, vol.56
, Issue.8
, pp. 1012-1032
-
-
Bruneliere, H.1
-
18
-
-
84937496349
-
-
Cloud Security Alliance. CLOUD CONTROLS MATRIX V3.0.1
-
Cloud Security Alliance. CLOUD CONTROLS MATRIX V3.0.1 (2014). https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3-0-1/
-
(2014)
-
-
|