-
5
-
-
84960142244
-
-
FedRAMP
-
FedRAMP, http://www. gsa. gov/portal/category/102375
-
-
-
-
6
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
January
-
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, Volume 34, Issue 1, January 2011, Pages 1-11
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
7
-
-
78349299500
-
The management of security in Cloud computing
-
2-4 Aug
-
Ramgovind, S.; Eloff, M. M.; Smith, E., "The management of security in Cloud computing, " Information Security for South Africa (ISSA), 2010, vol., no., pp. 1, 7, 2-4 Aug. 2010
-
(2010)
Information Security for South Africa (ISSA)
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.M.2
Smith, E.3
-
8
-
-
77954908948
-
Cloud security and privacy: An enterprise perspective on risks and compliance
-
T. Mather, S. Kumarswamy, S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 2009
-
(2009)
O'Reilly Media
-
-
Mather, T.1
Kumarswamy, S.2
Latif, S.3
-
12
-
-
85026957527
-
-
Vaultive, http://www. vaultive. com/technology/encryption-in-use/
-
-
-
-
14
-
-
84960142247
-
-
Introduction to ISO 27002
-
Introduction to ISO 27002, http://www. standards. bz/iso-27002. html
-
-
-
-
15
-
-
84960142248
-
-
ISO/IEC 27001
-
ISO/IEC 27001, http://www. iso. org/iso/home/standards/managementstandards/ iso27001. htm
-
-
-
-
16
-
-
85026956111
-
-
SAFE HARBOR
-
SAFE HARBOR, http://export. gov/safeharbor/eu/eg-main-018476. Asp
-
-
-
-
17
-
-
84960074781
-
-
HIPAA, may 2003
-
HIPAA, may 2003, Summary of HIPAA privacy rules. http://www. hhs. gov/ocr/privacy/hipaa/understanding/summary/privacys ummary. pdf
-
Summary of HIPAA Privacy Rules
-
-
-
18
-
-
84876757522
-
-
NIST SP 800-53
-
NIST SP 800-53, Information security, http://csrc. nist. gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final-updated-errata-05-01-2010. pdf
-
Information Security
-
-
-
22
-
-
1342336867
-
-
SOX
-
SOX, Sarbanes-Oxley Act, http://en. wikipedia. org/wiki/Sarbanes%E2%80%93Oxleyact
-
Sarbanes-Oxley Act
-
-
-
23
-
-
84960098249
-
-
Overview of OASIS SAML v2, https://www. oasis-open. org/ committees/download. php/27819/sstc-saml-tech-overview-2. 0-cd-02. pdf
-
Overview of OASIS SAML v2
-
-
-
25
-
-
84960106164
-
-
DMTF CADF, June 2012
-
DMTF CADF, June 2012, Cloud Auditing Data Federation http://www. dmtf. org/sites/default/files/standards/documents/DSP2028-1. 0. 0a. pdf
-
Cloud Auditing Data Federation
-
-
-
26
-
-
84960142250
-
-
NIST 800-16
-
NIST 800-16, http://csrc. nist. gov/publications/drafts/800-16-rev1/draft-sp800-16-rev1-2nd-draft. pdf
-
-
-
-
27
-
-
84960142251
-
-
NIST 800-50, Oct 2003, program
-
NIST 800-50, for awareness and training, Oct 2003, program, http://csrc. nist. gov/publications/nistpubs/800-50/NIST-SP800-50. pdf
-
For Awareness and Training
-
-
-
29
-
-
84960088006
-
-
PCI-DSS, oct 2010
-
PCI-DSS, oct 2010, requirement and security assessment, https://www. pcisecuritystandards. org/documents/pci-dss-v2. pdf
-
Requirement and Security Assessment
-
-
-
30
-
-
84869111922
-
-
NIST 800-61, Aug
-
NIST 800-61, Computer Security Incident Handling Guide, Aug 2012, http://csrc. nist. gov/publications/nistpubs/800-61rev2/SP800-61rev2. pdf
-
(2012)
Computer Security Incident Handling Guide
-
-
-
33
-
-
84976417670
-
Nemesis: Automated architecture for threat modeling and risk assessment for cloud computing
-
P Kamongi et al., Nemesis: Automated Architecture for Threat Modeling and Risk Assessment for Cloud Computing, ASE 2014
-
(2014)
ASE
-
-
Kamongi, P.1
-
34
-
-
77956353411
-
Cloud computing security issues and challenges
-
24-28 May
-
Popovi, K.; Hocenski, Z., "Cloud computing security issues and challenges, " MIPRO, 2010 Proceedings of the 33rd International Convention, vol., no., pp. 344, 349, 24-28 May 2010
-
(2010)
MIPRO, 2010 Proceedings of the 33rd International Convention
, pp. 344-349
-
-
Popovi, K.1
Hocenski, Z.2
|