메뉴 건너뛰기




Volumn 9264, Issue , 2015, Pages 113-123

Designing privacy-aware systems in the cloud

Author keywords

Cloud computing; Conceptual model; Design; Privacy; Process; Requirements

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; DESIGN; INTERNET; PROCESSING; WEB SERVICES; WORLD WIDE WEB;

EID: 84943635770     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-22906-5_9     Document Type: Conference Paper
Times cited : (10)

References (33)
  • 1
    • 84943592192 scopus 로고    scopus 로고
    • Privacy and Security Online, Carnegie Mellon University, Accessed 19 April 2015
    • Rainie, L, Kiesler, S., Kang, R, Madden, M: Anonymity, Privacy and Security Online, Carnegie Mellon University. http://www.pewinternet.org/2013/09/05/anonymity-privacyand- security-online/. Accessed 19 April 2015
    • Anonymity
    • Rainie, L.1    Kiesler, S.2    Kang, R.3    Madden, M.4
  • 2
    • 84943630443 scopus 로고    scopus 로고
    • TRUSTe, US Consumer Confidence Privacy Report, Accessed 19 April 2015
    • TRUSTe: US Consumer Confidence Privacy Report. http://www.truste.com/us-consumerconfidence-index-2014/. Accessed 19 April 2015
  • 3
    • 9244222724 scopus 로고    scopus 로고
    • Enhancing web privacy and anonymity in the digital era
    • Emerald Group Publishing Limited
    • Gritzalis, S.: Enhancing web privacy and anonymity in the digital era. Inf. Manage. Comput. Secur. 12(3), 255–288 (2004). Emerald Group Publishing Limited
    • (2004) Inf. Manage. Comput. Secur , vol.12 , Issue.3 , pp. 255-288
    • Gritzalis, S.1
  • 6
    • 84866253432 scopus 로고    scopus 로고
    • Aligning security and privacy to support the development of secure information systems
    • Mouratidis, H., Kalloniatis, C., Islam, S., Huget, M.P., Gritzalis, S.: Aligning security and privacy to support the development of secure information systems. J. Univ. Comput. Sci. 18 (12), 1608–1627 (2012)
    • (2012) J. Univ. Comput. Sci , vol.18 , Issue.12 , pp. 1608-1627
    • Mouratidis, H.1    Kalloniatis, C.2    Islam, S.3    Huget, M.P.4    Gritzalis, S.5
  • 9
    • 84870622004 scopus 로고    scopus 로고
    • ITU Technology Watch, International Telecommuni cations Union, Geneva, Switzerland
    • ITU Technology Watch: Privacy in Cloud Computing. International Telecommuni cations Union, Geneva, Switzerland (2012)
    • (2012) Privacy in Cloud Computing
  • 10
    • 84879869482 scopus 로고    scopus 로고
    • Privacy in the cloud: Bridging the gap between design and implementation
    • In: Franch, X., Soffer, P. (eds.), Springer, Heidelberg
    • Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol. 148, pp. 455–465. Springer, Heidelberg (2013)
    • (2013) Caise Workshops 2013. LNBIP , vol.148 , pp. 455-465
    • Manousakis, V.1    Kalloniatis, C.2    Kavakli, E.3    Gritzalis, S.4
  • 12
    • 84943640070 scopus 로고    scopus 로고
    • Top Threats to Cloud Computing Results update 2012
    • CSA Threats, Seattle, WA, USA
    • CSA Threats: Top Threats to Cloud Computing Results update 2012, Cloud Se-curity Alliance, Seattle, WA, USA (2012)
    • (2012) Cloud Se-Curity Alliance
  • 13
    • 84863498411 scopus 로고    scopus 로고
    • Privacy, security and trust in cloud computing
    • In: Pearson, S., Yee, G. (eds.), Springer-Verlag, London
    • Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Computer Communications and Networks. Springer-Verlag, London (2013)
    • (2013) Computer Communications and Networks
    • Pearson, S.1
  • 14
    • 84894259408 scopus 로고    scopus 로고
    • Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
    • Kalloniatis, C., Mouratidis, H., Manousakis, V., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stan. Interfaces 36, 759–775 (2014)
    • (2014) Comput. Stan. Interfaces , vol.36 , pp. 759-775
    • Kalloniatis, C.1    Mouratidis, H.2    Manousakis, V.3    Islam, S.4    Gritzalis, S.5    Kavakli, E.6
  • 16
    • 84869403221 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Accessed 09 December 2014
    • Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing (2012). Accessed 09 December 2014
    • (2012) Opinion 05/2012 on Cloud Computing
  • 17
    • 84941945944 scopus 로고    scopus 로고
    • Privacy in the cloud computing era
    • Microsoft Technical report, Microsoft Corp, Redmond, USA, November, Accessed 10 January 2015
    • Microsoft Technical report: Privacy in the cloud computing era, a Microsoft perspective, Microsoft Corp, Redmond, USA, November 2009. Accessed 10 January 2015
    • (2009) A Microsoft Perspective
  • 20
    • 33644968219 scopus 로고    scopus 로고
    • IT-Security and Privacy: Design and Use of Privacy Enhancing Security Mechanisms
    • Springer, Heidelberg
    • Fischer-Hübner, S.: IT-Security and Privacy: Design and Use of Privacy Enhancing Security Mechanisms. LNCS, vol. 1958. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1958
    • Fischer-Hübner, S.1
  • 23
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • Mouratidis, H., Giorgini, G.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Software Eng. Knowl. Eng. 17, 285–309 (2007)
    • (2007) Int. J. Software Eng. Knowl. Eng , vol.17 , pp. 285-309
    • Mouratidis, H.1    Giorgini, G.2
  • 24
    • 77950516884 scopus 로고    scopus 로고
    • Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
    • Houmb, S.H., Islam, S., Knauss, E., Jürjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requirements Eng. J. 15, 63–93 (2010)
    • (2010) Requirements Eng. J , vol.15 , pp. 63-93
    • Houmb, S.H.1    Islam, S.2    Knauss, E.3    Jürjens, J.4    Schneider, K.5
  • 25
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Eng. J. 10, 34–44 (2005)
    • (2005) Requirements Eng. J , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 27
    • 84878677619 scopus 로고    scopus 로고
    • A Pattern Language for Developing Privacy Enhancing Technologies
    • Hafiz, M.: A Pattern Language for Developing Privacy Enhancing Technologies. Software Practice and Experience. 43, 769–787 (2013)
    • (2013) Software Practice and Experience , vol.43 , pp. 769-787
    • Hafiz, M.1
  • 28
    • 77955462130 scopus 로고    scopus 로고
    • Towards a framework to elicit and manage security and privacy requirements from laws and regulations
    • In: Wieringa, R., Persson, A. (eds.), Springer, Heidelberg
    • Islam, S., Mouratidis, H., Wagner, S.: Towards a framework to elicit and manage security and privacy requirements from laws and regulations. In: Wieringa, R., Persson, A. (eds.) REFSQ 2010. LNCS, vol. 6182, pp. 255–261. Springer, Heidelberg (2010)
    • (2010) REFSQ 2010. LNCS , vol.6182 , pp. 255-261
    • Islam, S.1    Mouratidis, H.2    Wagner, S.3
  • 29
    • 77950519059 scopus 로고    scopus 로고
    • Evaluating existing secu-rity and privacy requirements for legal compliance
    • Massey, A.K., Otto, P.N., Hayward, L.J., Antón, A.I.: Evaluating existing secu-rity and privacy requirements for legal compliance. Requirements Eng. J. 15, 119–137 (2010)
    • (2010) Requirements Eng. J , vol.15 , pp. 119-137
    • Massey, A.K.1    Otto, P.N.2    Hayward, L.J.3    Antón, A.I.4
  • 30
    • 84863932631 scopus 로고    scopus 로고
    • Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
    • San Fransisco, CA, USENIX Association, Berkeley, 8–12 August
    • Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., Weippl, E.: Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proceedings of the 20th USENIX Conference on Security, San Fransisco, CA, p. 5. USENIX Association, Berkeley, 8–12 August 2011
    • (2011) Proceedings of the 20Th USENIX Conference on Security , pp. 5
    • Mulazzani, M.1    Schrittwieser, S.2    Leithner, M.3    Huber, M.4    Weippl, E.5
  • 32
  • 33
    • 84881476966 scopus 로고    scopus 로고
    • A goal-driven risk management approach to support security and privacy analysis of cloud-based system
    • IGI global publication
    • Islam, S., Mouratidis, H., Weippl, E.: A goal-driven risk management approach to support security and privacy analysis of cloud-based system. In: Security Engineering for Cloud Computing: Approaches and Tools. IGI global publication (2012)
    • (2012) Security Engineering for Cloud Computing: Approaches and Tools
    • Islam, S.1    Mouratidis, H.2    Weippl, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.