-
2
-
-
84870163538
-
A governance model for cloud computing
-
in Wuhan, China
-
Z. Guo, M. Song, and J. Song, " A governance model for cloud computing," in Proceedings of the International Conference on Management and Service Science, Wuhan, China, 2010, pp. 1-6.
-
(2010)
Proceedings of the International Conference on Management and Service Science
, pp. 1-6
-
-
Guo, Z.1
Song, M.2
Song, J.3
-
3
-
-
79960241719
-
A business model for cloud computing based on a separate encryption and decryption service
-
in Jeju, Korea
-
J. J. Hwang, H. K. Chuang, Y. C. Hsu, and C. H. Wu, " A business model for cloud computing based on a separate encryption and decryption service," in Proceedings of the International Conference on Information Science and Applications, Jeju, Korea, 2011, pp. 1-7.
-
(2011)
Proceedings of the International Conference on Information Science and Applications
, pp. 1-7
-
-
Hwang, J.J.1
Chuang, H.K.2
Hsu, Y.C.3
Wu, C.H.4
-
5
-
-
84883696842
-
Applying BMIS to cloud security
-
in, N. Pohlmann, H. Reimer, and W. Schneider, Eds. Berlin, Germany: Vieweg+Teubner Verlag
-
R. von Rössing, " Applying BMIS to cloud security," in ISSE 2010 Securing Electronic Business Processes, N. Pohlmann, H. Reimer, and W. Schneider, Eds. Berlin, Germany: Vieweg+Teubner Verlag, 2011, pp. 101-112.
-
(2011)
ISSE 2010 Securing Electronic Business Processes
, pp. 101-112
-
-
von Rössing, R.1
-
6
-
-
84944444288
-
The business model for information security
-
in London, UK
-
S. Sembhi, " The business model for information security," in RSA Conference Europe, London, UK, 2010.
-
(2010)
RSA Conference Europe
-
-
Sembhi, S.1
-
8
-
-
84944443966
-
-
Information Systems Audit and Control Association (ISACA), Available
-
Information Systems Audit and Control Association (ISACA) (2010). An introduction to the business model for information security [Online]. Available: http://www.isaca.org/Knowledge-Center/Research/Documents/Introduction-to-the-Business-Model-for-Information-Security_res_Eng_0109.pdf
-
(2010)
An introduction to the business model for information security [Online]
-
-
-
9
-
-
84944443536
-
-
Information Systems Audit and Control Association (ISACA), Available [Online]
-
Information Systems Audit and Control Association (ISACA) (2010). ISACA issues new comprehensive business model for information security [Online]. Available: http://www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/ISACA-Issues-New-Comprehensive-Business-Model-for-Information-Security.aspx
-
(2010)
ISACA issues new comprehensive business model for information security
-
-
-
10
-
-
0000883537
-
Management information crisis
-
R. D. Daniel, " Management information crisis," Harvard Business Review, vol. 39, no. 5, pp. 111-121, 1961.
-
(1961)
Harvard Business Review
, vol.39
, Issue.5
, pp. 111-121
-
-
Daniel, R.D.1
-
11
-
-
0018451997
-
Chief executives define their own data needs
-
J. F. Rockart, " Chief executives define their own data needs," Harvard Business Review, vol. 57, no. 2, pp. 81-93, 1979.
-
(1979)
Harvard Business Review
, vol.57
, Issue.2
, pp. 81-93
-
-
Rockart, J.F.1
-
12
-
-
0011571031
-
A primer on critical success factors
-
Alfred P. Sloan School of Management, Center for Information Systems Research, Working Paper No. 69
-
C. V. Bullen and J. F. Rockart, " A primer on critical success factors," Alfred P. Sloan School of Management, Center for Information Systems Research, Working Paper No. 69, 1981.
-
(1981)
-
-
Bullen, C.V.1
Rockart, J.F.2
-
13
-
-
84944444047
-
Critical Success Factor [Online]
-
Wikipedia., Available
-
Wikipedia. Critical Success Factor [Online]. Available: http://en.wikipedia.org/wiki/Critical_success_factor#cite_note-4
-
-
-
-
14
-
-
57149133069
-
The critical success factor method: establishing a foundation for enterprise security management
-
Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU/SEI-2004-TR-010
-
R. A. Caralli, " The critical success factor method: establishing a foundation for enterprise security management," Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU/SEI-2004-TR-010, 2004.
-
(2004)
-
-
Caralli, R.A.1
-
15
-
-
83755183298
-
How to manage information security in cloud computing
-
in Anchorage, AK
-
J. S. Wang, C. H. Liu, and G. T. R. Lin, " How to manage information security in cloud computing," in IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, 2011, pp. 1405-1410.
-
(2011)
IEEE International Conference on Systems, Man, and Cybernetics
, pp. 1405-1410
-
-
Wang, J.S.1
Liu, C.H.2
Lin, G.T.R.3
-
16
-
-
84883310301
-
Cloud risk: 10 principles and a framework for assessment
-
D. Vohradsky, " Cloud risk: 10 principles and a framework for assessment," ISACA Journal, vol. 5, pp. 31-41, 2012.
-
(2012)
ISACA Journal
, vol.5
, pp. 31-41
-
-
Vohradsky, D.1
-
17
-
-
84944443566
-
-
Wikipedia. [Online]. Available
-
Wikipedia. Lever [Online]. Available: http://en.wikipedia.org/wiki/Lever#cite_note-1
-
Lever
-
-
-
18
-
-
79952065844
-
-
Cloud Security Alliance (CSA), Available
-
Cloud Security Alliance (CSA) (2010). Top Threats to Cloud Computing V1.0 [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
-
(2010)
Top Threats to Cloud Computing V1.0 [Online]
-
-
-
19
-
-
82955173715
-
Notice of violation of IEEE publication principles security risk analysis for cloud computing systems
-
in Prague, Czech Republic
-
V. Mukhin and A. Volokyta, " Notice of violation of IEEE publication principles security risk analysis for cloud computing systems," in Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Prague, Czech Republic, 2011, pp. 737-742.
-
(2011)
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems
, pp. 737-742
-
-
Mukhin, V.1
Volokyta, A.2
-
21
-
-
84893924156
-
Security issues in cloud computing: a transparent view
-
Y. Kadam, " Security issues in cloud computing: a transparent view," International Journal of Computer Science & Emerging Technologies, vol. 2, no. 5, pp. 316-322, 2011.
-
(2011)
International Journal of Computer Science & Emerging Technologies
, vol.2
, Issue.5
, pp. 316-322
-
-
Kadam, Y.1
-
22
-
-
84944444289
-
Gartner: seven cloud-computing security risks
-
[Online]. Available
-
J. Brodkin, " Gartner: seven cloud-computing security risks," InfoWorld News [Online]. Available: http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
-
InfoWorld News
-
-
Brodkin, J.1
-
23
-
-
84944443523
-
Cloud computing data security internet and web system2-term paper
-
unpublished.
-
S. K. B. Tammaiah, " Cloud computing data security internet and web system2-term paper," unpublished.
-
-
-
Tammaiah, S.K.B.1
-
24
-
-
2942753973
-
Specifying reusable security requirements
-
D. Firesmith, " Specifying reusable security requirements," Journal of Object Technology, vol. 3, no. 1, pp, 61-75, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
25
-
-
84871597858
-
-
Wikipedia. [Online]. Available
-
Wikipedia. Technology [Online]. Available: http://en.wikipedia.org/wiki/Technology
-
Technology
-
-
-
26
-
-
84944444290
-
Security & standards in the Cloud: building trust through openness and interoperability in the Cloud
-
unpublished.
-
Y. Li, " Security & standards in the Cloud: building trust through openness and interoperability in the Cloud," unpublished.
-
-
-
Li, Y.1
-
27
-
-
77957948993
-
QUIRC: a quantitative impact and risk assessment framework for cloud security
-
in Miami, FL
-
P. Saripalli and B. Walters, " QUIRC: a quantitative impact and risk assessment framework for cloud security," in Proceedings of the IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 280-288.
-
(2010)
Proceedings of the IEEE 3rd International Conference on Cloud Computing
, pp. 280-288
-
-
Saripalli, P.1
Walters, B.2
|