-
1
-
-
79960903995
-
A farewell to trust: An approach to confidentiality control in the cloud
-
M. G. Jaatun, A. A. Nyre, S. Alapnes, and G. Zhao, "A Farewell to Trust: An Approach to Confidentiality Control in the Cloud, " in Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless Vitae Chennai 2011), 2011.
-
(2011)
Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless Vitae Chennai 2011)
-
-
Jaatun, M.G.1
Nyre, A.A.2
Alapnes, S.3
Zhao, G.4
-
2
-
-
84961622270
-
-
October
-
M. G. Jaatun, P. H. Meland, K. Bernsmed, H. Castejón, and A. Undheim, "Cloud Security Whitepaper-A Briefing on Cloud Security Challenges and Opportunities, " October 2013. http://www. telenor. com/media/articles/2013/safe-in-the-cloud/
-
(2013)
Cloud Security Whitepaper-A Briefing on Cloud Security Challenges and Opportunities
-
-
Jaatun, M.G.1
Meland, P.H.2
Bernsmed, K.3
Castejón, H.4
Undheim, A.5
-
4
-
-
78650100295
-
Towards incident handling in the cloud: Challenges and approaches
-
New York, NY, USA: ACM
-
B. Grobauer and T. Schreck, "Towards incident handling in the cloud: Challenges and approaches, " in Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '10. New York, NY, USA: ACM, 2010, pp. 77-86. http://doi. acm. org/10. 1145/1866835. 1866850
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Ser. CCSW '10
, pp. 77-86
-
-
Grobauer, B.1
Schreck, T.2
-
5
-
-
84916918767
-
A survey of information security incident handling in the cloud
-
N. H. A. Rahman and K.-K. R. Choo, "A survey of information security incident handling in the cloud, " Computers & Security, vol. 49, no. 0, pp. 45-69, 2015. http://www. sciencedirect. com/science/article/pii/S0167404814001680
-
(2015)
Computers & Security
, vol.49
, pp. 45-69
-
-
Rahman, N.H.A.1
Choo, K.-K.R.2
-
6
-
-
84952344534
-
Cloud incident management, challenges, research directions, and architectural approach
-
Dec
-
V. Munteanu, A. Edmonds, T. Bohnert, and T.-F. Fortis, "Cloud incident management, challenges, research directions, and architectural approach, " in Utility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International Conference on, Dec 2014, pp. 786-791.
-
(2014)
Utility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International Conference on
, pp. 786-791
-
-
Munteanu, V.1
Edmonds, A.2
Bohnert, T.3
Fortis, T.-F.4
-
8
-
-
84869111922
-
-
National Institute of Standards and Technology Special Publication 800-61
-
P. Cichonski, T. Millar, T. Grance, and K. Scarfone, "Computer Security Incident Handling Guide, " National Institute of Standards and Technology Special Publication 800-61, 2012.
-
(2012)
Computer Security Incident Handling Guide
-
-
Cichonski, P.1
Millar, T.2
Grance, T.3
Scarfone, K.4
-
11
-
-
85015208922
-
Expressing cloud security requirements for slas in deontic contract languages for cloud brokers
-
P. H. Meland, K. Bernsmed, M. G. Jaatun, H. N. Castejón, and A. Undheim, "Expressing cloud security requirements for slas in deontic contract languages for cloud brokers, " Int. J. of Cloud Computing, vol. 3, no. 1, pp. 69-93, 2014.
-
(2014)
Int. J. of Cloud Computing
, vol.3
, Issue.1
, pp. 69-93
-
-
Meland, P.H.1
Bernsmed, K.2
Jaatun, M.G.3
Castejón, H.N.4
Undheim, A.5
-
12
-
-
84937832895
-
Towards strong accountability for cloud service providers
-
Dec
-
M. G. Jaatun, S. Pearson, F. Gittler, and R. Leenes, "Towards strong accountability for cloud service providers, " in Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on, Dec 2014, pp. 1001-1006.
-
(2014)
Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on
, pp. 1001-1006
-
-
Jaatun, M.G.1
Pearson, S.2
Gittler, F.3
Leenes, R.4
-
13
-
-
79960701594
-
Integrated security incident management-concepts and real-world experiences
-
S. Metzger, W. Hommel, and H. Reiser, "Integrated Security Incident Management-Concepts and Real-World Experiences, " in Sixth International Conference on IT Security Incident Management and IT Forensics (IMF), 2011, pp. 107-121.
-
(2011)
Sixth International Conference on IT Security Incident Management and IT Forensics (IMF)
, pp. 107-121
-
-
Metzger, S.1
Hommel, W.2
Reiser, H.3
-
14
-
-
84942626447
-
Understanding collaborative challenges in it security preparedness exercises
-
M. B. Line and N. B. Moe, "Understanding Collaborative Challenges in IT Security Preparedness Exercises, " in Proceedings of IFIP SEC, 2015.
-
(2015)
Proceedings of IFIP SEC
-
-
Line, M.B.1
Moe, N.B.2
-
15
-
-
84863491154
-
From outsourcing to cloud computing: Evolution of it services
-
S. Dhar, "From outsourcing to cloud computing: evolution of it services, " Management Research Review, vol. 35, no. 8, pp. 664-675, 2012.
-
(2012)
Management Research Review
, vol.35
, Issue.8
, pp. 664-675
-
-
Dhar, S.1
-
16
-
-
84862303039
-
Incident response teams-challenges in supporting the organisational security function
-
A. Ahmad, J. Hadgkiss, and A. B. Ruighaver, "Incident Response Teams-Challenges in Supporting the Organisational Security Function, " Computers & Security, vol. 31, no. 5, pp. 643-652, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.5
, pp. 643-652
-
-
Ahmad, A.1
Hadgkiss, J.2
Ruighaver, A.B.3
-
17
-
-
84555190216
-
Information needs of system administrators in information technology service factories
-
New York, NY, USA: ACM
-
C. R. B. de Souza, C. S. Pinhanez, and V. F. Cavalcante, "Information needs of system administrators in information technology service factories, " in Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, ser. CHIMIT '11. New York, NY, USA: ACM, 2011, pp. 3: 1-3: 10. http://doi. acm. org/10. 1145/2076444. 2076447
-
(2011)
Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, Ser. CHIMIT '11
, pp. 31-310
-
-
De Souza, C.R.B.1
Pinhanez, C.S.2
Cavalcante, V.F.3
-
18
-
-
84908227974
-
Security automation and threat information-sharing options
-
Sept
-
P. Kampanakis, "Security automation and threat information-sharing options, " Security Privacy, IEEE, vol. 12, no. 5, pp. 42-51, Sept 2014.
-
(2014)
Security Privacy, IEEE
, vol.12
, Issue.5
, pp. 42-51
-
-
Kampanakis, P.1
-
19
-
-
70350716910
-
The intrusion detection message exchange format (IDMEF)
-
March
-
H. Debar, D. A. Curry, and B. S. Feinstein, "The Intrusion Detection Message Exchange Format (IDMEF), " IETF Network Working Group RFC 4765, March 2007. http://www. ietf. org/rfc/rfc4765. txt
-
(2007)
IETF Network Working Group RFC
, vol.4765
-
-
Debar, H.1
Curry, D.A.2
Feinstein, B.S.3
-
20
-
-
77956576296
-
The incident object description exchange format
-
December
-
R. Danyliw, J. Meijer, and Y. Demchenko, " The Incident Object Description Exchange Format, " IETF Network Working Group RFC 5070, December 2007. http://www. ietf. org/rfc/rfc5070. txt
-
(2007)
IETF Network Working Group RFC
, vol.5070
-
-
Danyliw, R.1
Meijer, J.2
Demchenko, Y.3
-
21
-
-
84961651191
-
-
Cloud Security Alliance
-
Cloud Security Alliance, " Cloud Trust Protocol. " https: //cloudsecurityalliance. org/research/ctp/
-
Cloud Trust Protocol
-
-
-
22
-
-
84889038758
-
Distributed privacy-preserving transparency logging
-
New York, NY, USA: ACM
-
T. Pulls, R. Peeters, and K. Wouters, "Distributed privacy-preserving transparency logging, " in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, ser. WPES '13. New York, NY, USA: ACM, 2013, pp. 83-94. http://doi. acm. org/10. 1145/2517840. 2517847
-
(2013)
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, Ser. WPES '13
, pp. 83-94
-
-
Pulls, T.1
Peeters, R.2
Wouters, K.3
-
23
-
-
84883363532
-
Identifying a shared mental model among incident responders
-
March
-
R. Floodeen, J. Haller, and B. Tjaden, "Identifying a shared mental model among incident responders, " in IT Security Incident Management and IT Forensics (IMF), 2013 Seventh International Conference on, March 2013, pp. 15-25.
-
(2013)
IT Security Incident Management and IT Forensics (IMF), 2013 Seventh International Conference on
, pp. 15-25
-
-
Floodeen, R.1
Haller, J.2
Tjaden, B.3
|