메뉴 건너뛰기




Volumn , Issue , 2015, Pages 467-473

How much cloud can you handle?

Author keywords

Accountability; Cloud computing; Incident response; Privacy; Security

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY;

EID: 84961574664     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2015.38     Document Type: Conference Paper
Times cited : (8)

References (23)
  • 5
    • 84916918767 scopus 로고    scopus 로고
    • A survey of information security incident handling in the cloud
    • N. H. A. Rahman and K.-K. R. Choo, "A survey of information security incident handling in the cloud, " Computers & Security, vol. 49, no. 0, pp. 45-69, 2015. http://www. sciencedirect. com/science/article/pii/S0167404814001680
    • (2015) Computers & Security , vol.49 , pp. 45-69
    • Rahman, N.H.A.1    Choo, K.-K.R.2
  • 11
    • 85015208922 scopus 로고    scopus 로고
    • Expressing cloud security requirements for slas in deontic contract languages for cloud brokers
    • P. H. Meland, K. Bernsmed, M. G. Jaatun, H. N. Castejón, and A. Undheim, "Expressing cloud security requirements for slas in deontic contract languages for cloud brokers, " Int. J. of Cloud Computing, vol. 3, no. 1, pp. 69-93, 2014.
    • (2014) Int. J. of Cloud Computing , vol.3 , Issue.1 , pp. 69-93
    • Meland, P.H.1    Bernsmed, K.2    Jaatun, M.G.3    Castejón, H.N.4    Undheim, A.5
  • 14
    • 84942626447 scopus 로고    scopus 로고
    • Understanding collaborative challenges in it security preparedness exercises
    • M. B. Line and N. B. Moe, "Understanding Collaborative Challenges in IT Security Preparedness Exercises, " in Proceedings of IFIP SEC, 2015.
    • (2015) Proceedings of IFIP SEC
    • Line, M.B.1    Moe, N.B.2
  • 15
    • 84863491154 scopus 로고    scopus 로고
    • From outsourcing to cloud computing: Evolution of it services
    • S. Dhar, "From outsourcing to cloud computing: evolution of it services, " Management Research Review, vol. 35, no. 8, pp. 664-675, 2012.
    • (2012) Management Research Review , vol.35 , Issue.8 , pp. 664-675
    • Dhar, S.1
  • 16
    • 84862303039 scopus 로고    scopus 로고
    • Incident response teams-challenges in supporting the organisational security function
    • A. Ahmad, J. Hadgkiss, and A. B. Ruighaver, "Incident Response Teams-Challenges in Supporting the Organisational Security Function, " Computers & Security, vol. 31, no. 5, pp. 643-652, 2012.
    • (2012) Computers & Security , vol.31 , Issue.5 , pp. 643-652
    • Ahmad, A.1    Hadgkiss, J.2    Ruighaver, A.B.3
  • 18
    • 84908227974 scopus 로고    scopus 로고
    • Security automation and threat information-sharing options
    • Sept
    • P. Kampanakis, "Security automation and threat information-sharing options, " Security Privacy, IEEE, vol. 12, no. 5, pp. 42-51, Sept 2014.
    • (2014) Security Privacy, IEEE , vol.12 , Issue.5 , pp. 42-51
    • Kampanakis, P.1
  • 19
    • 70350716910 scopus 로고    scopus 로고
    • The intrusion detection message exchange format (IDMEF)
    • March
    • H. Debar, D. A. Curry, and B. S. Feinstein, "The Intrusion Detection Message Exchange Format (IDMEF), " IETF Network Working Group RFC 4765, March 2007. http://www. ietf. org/rfc/rfc4765. txt
    • (2007) IETF Network Working Group RFC , vol.4765
    • Debar, H.1    Curry, D.A.2    Feinstein, B.S.3
  • 20
    • 77956576296 scopus 로고    scopus 로고
    • The incident object description exchange format
    • December
    • R. Danyliw, J. Meijer, and Y. Demchenko, " The Incident Object Description Exchange Format, " IETF Network Working Group RFC 5070, December 2007. http://www. ietf. org/rfc/rfc5070. txt
    • (2007) IETF Network Working Group RFC , vol.5070
    • Danyliw, R.1    Meijer, J.2    Demchenko, Y.3
  • 21
    • 84961651191 scopus 로고    scopus 로고
    • Cloud Security Alliance
    • Cloud Security Alliance, " Cloud Trust Protocol. " https: //cloudsecurityalliance. org/research/ctp/
    • Cloud Trust Protocol


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.