메뉴 건너뛰기




Volumn 215, Issue , 2015, Pages 507-517

A framework for secure migration processes of legacy systems to the cloud

Author keywords

Cloud computing; Computer security; CSA; KDM; Legacy software migration

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; CLOUD COMPUTING; COGNITIVE SYSTEMS; DESIGN; DISTRIBUTED COMPUTER SYSTEMS; ENTERPRISE RESOURCE MANAGEMENT; ENTERPRISE RESOURCE PLANNING; INFORMATION MANAGEMENT; INFORMATION SYSTEMS; MANAGEMENT INFORMATION SYSTEMS; MOBILE SECURITY; SECURITY OF DATA; SECURITY SYSTEMS; SYSTEMS ENGINEERING;

EID: 84937458587     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-19243-7_46     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 1
    • 84937496342 scopus 로고    scopus 로고
    • Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0
    • Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 (2011)
    • (2011)
  • 2
    • 84937496343 scopus 로고    scopus 로고
    • European Commission, Unleashing the Potential of Cloud Computing in Europe. Communication from the commission to the European Parliament, the council, the European economic and social Committee and the Committee of the regions
    • European Commission, Unleashing the Potential of Cloud Computing in Europe. Communication from the commission to the European Parliament, the council, the European economic and social Committee and the Committee of the regions (2012)
    • (2012)
  • 3
    • 84937496344 scopus 로고    scopus 로고
    • A security approach for data migration in cloud computing
    • Kushwah, V.S., Saxena, A.: A security approach for data migration in cloud computing. Int. J. Sci. Res. Publ. 3(5) (2013)
    • (2013) Int. J. Sci. Res. Publ , vol.3 , Issue.5
    • Kushwah, V.S.1    Saxena, A.2
  • 4
    • 8444222126 scopus 로고    scopus 로고
    • Legacy system migration: A legacy data migration engine
    • Czech Republic, Brno
    • Wu, B., et al.: Legacy system migration: a legacy data migration engine. In: 17th International Database Conference (DATASEM 1997), pp. 129–138. Czech Republic, Brno (1997)
    • (1997) 17Th International Database Conference (DATASEM 1997) , pp. 129-138
    • Wu, B.1
  • 5
    • 0033184720 scopus 로고    scopus 로고
    • Legacy information system migration: A brief review of problems
    • Bisbal, J., et al.: Legacy information system migration: a brief review of problems. Solutions Res. Issues 16(5), 103–111 (1999)
    • (1999) Solutions Res. Issues , vol.16 , Issue.5 , pp. 103-111
    • Bisbal, J.1
  • 7
    • 84937496345 scopus 로고    scopus 로고
    • PwC, The Future of IT Outsourcing and Cloud Computing
    • PwC, The Future of IT Outsourcing and Cloud Computing (2011)
    • (2011)
  • 8
    • 84937496346 scopus 로고    scopus 로고
    • Cloud Computing Use Case Discussion Group, Cloud Computing Use Cases White Paper version 4.0
    • Cloud Computing Use Case Discussion Group, Cloud Computing Use Cases White Paper version 4.0 (2010)
    • (2010)
  • 9
    • 84937440609 scopus 로고    scopus 로고
    • Security in legacy systems migration to the cloud: A systematic mapping study
    • Lisbon, Portugal
    • Alcañiz, L.M., et al.: Security in legacy systems migration to the cloud: a systematic mapping study. In: 11th International Workshop on Security in Information Systems, pp. 93–100. Lisbon, Portugal (2014)
    • (2014) 11Th International Workshop on Security in Information Systems , pp. 93-100
    • Alcañiz, L.M.1
  • 10
    • 84881477485 scopus 로고    scopus 로고
    • Security analysis in the migration to cloud environments
    • Rosado, D.G., et al.: Security analysis in the migration to cloud environments. Future Internet 4, 469–487 (2012)
    • (2012) Future Internet , vol.4 , pp. 469-487
    • Rosado, D.G.1
  • 12
    • 84937496347 scopus 로고    scopus 로고
    • OMG, Architecture-Driven Modernization. Knowledge Discovery Meta-Model (KDM), v1.3
    • OMG, Architecture-Driven Modernization. Knowledge Discovery Meta-Model (KDM), v1.3 (2011)
    • (2011)
  • 13
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)
    • (2007) Int. J. Softw. Eng. Knowl. Eng , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 14
    • 84937496348 scopus 로고    scopus 로고
    • Cloud Security Alliance. CSA Security, Trust & Assurance Registry (STAR)
    • Cloud Security Alliance. CSA Security, Trust & Assurance Registry (STAR) (2014). https://cloudsecurityalliance.org/star/
    • (2014)
  • 17
    • 84900002114 scopus 로고    scopus 로고
    • Modisco: A model driven reverse engineering framework
    • Bruneliere, H., et al.: Modisco: a model driven reverse engineering framework. Inf. Softw. Technol. 56(8), 1012–1032 (2014)
    • (2014) Inf. Softw. Technol , vol.56 , Issue.8 , pp. 1012-1032
    • Bruneliere, H.1
  • 18
    • 84937496349 scopus 로고    scopus 로고
    • Cloud Security Alliance. CLOUD CONTROLS MATRIX V3.0.1
    • Cloud Security Alliance. CLOUD CONTROLS MATRIX V3.0.1 (2014). https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3-0-1/
    • (2014)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.