-
3
-
-
84948094592
-
Datenschutzrechtliche Lösungen für Cloud Computing
-
Borges, G. et al.: Datenschutzrechtliche Lösungen für Cloud Computing. Kompetenzzentrum Trusted Cloud, http://www.trusted-cloud.de, (2012)
-
(2012)
Kompetenzzentrum Trusted Cloud
-
-
Borges, G.1
-
5
-
-
84922589983
-
-
Technical Report, Gartner
-
Contu, R., Pingree, L., Ahlm, E.: Predicts 2013: Security Solutions. Technical Report, Gartner (2012)
-
(2012)
Predicts 2013: Security Solutions
-
-
Contu, R.1
Pingree, L.2
Ahlm, E.3
-
6
-
-
84948113682
-
-
Eurocloud Deutschland eco e.V
-
Eurocloud Deutschland eco e.V.: Leitfaden Cloud Computing, (2010)
-
(2010)
Leitfaden Cloud Computing
-
-
-
10
-
-
84926426310
-
A quantitative analysis of current security concerns and solutions for cloud computing
-
Gonzales, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. In: Journal of Cloud Computing: Advances, Systems and Applications, 1(1) (2012)
-
(2012)
Journal of Cloud Computing: Advances, Systems and Applications
, vol.1
, Issue.1
-
-
Gonzales, N.1
Miers, C.2
Redigolo, F.3
Simplicio, M.4
Carvalho, T.5
Näslund, M.6
Pourzandi, M.7
-
11
-
-
84895539842
-
The OAuth 2.0 Authorization Framework, Request for Comments: 6749
-
Hardt, D. (Ed.): The OAuth 2.0 Authorization Framework, Request for Comments: 6749, Internet Engineering Task Force IETF (2012)
-
(2012)
Internet Engineering Task Force IETF
-
-
Hardt, D.1
-
14
-
-
84886743417
-
-
Version 1.0, OASIS specification
-
Lipton, P., Moser, S., Palma, D., Spatzier, T.: Topology and Orchestration Specification for Cloud Applications (TOSCA), Version 1.0, http://www.oasis-open.org/committees/tc\_home.php?wg\_abbrev=tosca OASIS specification (2013)
-
(2013)
Topology and Orchestration Specification for Cloud Applications (TOSCA)
-
-
Lipton, P.1
Moser, S.2
Palma, D.3
Spatzier, T.4
-
16
-
-
78649245486
-
Guide for Applying the Risk Management Framework to Federal Information Systems-A Security Life Cycle Approach
-
National Institute of Standards and Technology (NIST)
-
National Institute of Standards and Technology (NIST): Guide for Applying the Risk Management Framework to Federal Information Systems-A Security Life Cycle Approach, NIST Special Publication 800-37, (2010)
-
(2010)
NIST Special Publication
, pp. 800-837
-
-
-
17
-
-
85025681324
-
-
Technical report, CloudCycle
-
Niehues, P., Kunz, T., Posiadlo, L.: Das CloudCycle-Ö kosystem, Technical report, http://www.cloudcycle.org, CloudCycle (2013)
-
(2013)
Das CloudCycle-Ö Kosystem
-
-
Niehues, P.1
Kunz, T.2
Posiadlo, L.3
-
18
-
-
84902274706
-
Empfehlungen zur Gestaltung von Cloud-Service-Zertifizierungen
-
Schneider, S., Lansing, J., Sunyaev, A.: Empfehlungen zur Gestaltung von Cloud-Service-Zertifizierungen, In: Industrie Management-Zeitschrift für industrielle Geschäftsprozesse, pp. 13-17 (2013)
-
(2013)
Industrie Management-Zeitschrift für Industrielle Geschäftsprozesse
, pp. 13-17
-
-
Schneider, S.1
Lansing, J.2
Sunyaev, A.3
-
19
-
-
85021950441
-
Secure audit logs to support computer forensics
-
ACM New York, USA
-
Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics, In: ACM Transactions on Information and System Security (TISSEC) 1999, Volume 2, pp. 159-176, ACM New York, USA (1999)
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
20
-
-
84948113531
-
-
Die Kontrollpflicht nach § 11 Abs. 2 Satz 4 BDSG im Zeitalter des Cloud Computing, In: DuD 04/2013
-
Selzer, A.: Die Kontrollpflicht nach § 11 Abs. 2 Satz 4 BDSG im Zeitalter des Cloud Computing, In: DuD 04/2013
-
-
-
Selzer, A.1
-
21
-
-
84885750799
-
A Framework for Secure and Verifiable Logging in Public Communication Networks
-
Springer Berlin Heidelberg
-
Stathopoulos, V., Kotzanikolaou, P., Magkos, E.: A Framework for Secure and Verifiable Logging in Public Communication Networks, In: Critical Information Infrastructures Security, Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 273-284 (2006)
-
(2006)
Critical Information Infrastructures Security, Lecture Notes in Computer Science
, pp. 273-284
-
-
Stathopoulos, V.1
Kotzanikolaou, P.2
Magkos, E.3
-
22
-
-
84894120155
-
Towards a Policy-Framework for Provisioning and Management of Cloud Services
-
Waizenegger, T., Wieland, M., Binz, T., Breitenbücher, U.: Towards a Policy-Framework for Provisioning and Management of Cloud Services, In: SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies (2013)
-
(2013)
SECURWARE 2013, the Seventh International Conference on Emerging Security Information, Systems and Technologies
-
-
Waizenegger, T.1
Wieland, M.2
Binz, T.3
Breitenbücher, U.4
-
23
-
-
84886738359
-
Policy4TOSCA: A Policy-Aware Cloud Service Provisioning Approach to Enable Secure Cloud Computing
-
Waizenegger, T., Wieland, M., Binz, T., Breitenbücher, U., Haupt, F., Kopp, O., Leymann, F., Mitschang, B., Nowak, A., Wagner, S.: Policy4TOSCA: A Policy-Aware Cloud Service Provisioning Approach to Enable Secure Cloud Computing, In: DOA-Trusted Cloud’13 International Conference on Secure Virtual Infrastructures (2013)
-
(2013)
Doa-Trusted Cloud’13 International Conference on Secure Virtual Infrastructures
-
-
Waizenegger, T.1
Wieland, M.2
Binz, T.3
Breitenbücher, U.4
Haupt, F.5
Kopp, O.6
Leymann, F.7
Mitschang, B.8
Nowak, A.9
Wagner, S.10
-
24
-
-
77952589508
-
-
Princeton University and Palo Alto Research Center
-
Waters, B. R., Balfanz, D., Durfee, G., Smetters, D. K.: Building an Encrypted and Searchable Audit Log, Princeton University and Palo Alto Research Center (2004)
-
(2004)
Building an Encrypted and Searchable Audit Log
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
|