-
1
-
-
84908642167
-
Pattern-based and ISO 27001 compliant risk analysis for cloud systems
-
August
-
Alebrahim, A., Hatebur, D., Goeke, L.: Pattern-based and ISO 27001 compliant risk analysis for cloud systems. In: 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), pp. 42-47, August 2014
-
(2014)
2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
, pp. 42-47
-
-
Alebrahim, A.1
Hatebur, D.2
Goeke, L.3
-
2
-
-
68249129760
-
-
Technical report UCB/EECS-2009-28, EECS Department, University of California, Berkeley
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a berkeley view of cloud computing. Technical report UCB/EECS-2009-28, EECS Department, University of California, Berkeley. http: //www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
-
Above the clouds: A berkeley view of cloud computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
80455140374
-
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
-
August
-
Beckers, K., Schmidt, H., Kuster, J., Fassbender, S.: Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 327-333, August 2011
-
(2011)
2011 Sixth International Conference on Availability, Reliability and Security (ARES)
, pp. 327-333
-
-
Beckers, K.1
Schmidt, H.2
Kuster, J.3
Fassbender, S.4
-
4
-
-
84976606059
-
-
May
-
CARiSMA: Carisma framework, May 2015. https: //www-secse.cs.tu-dortmund. de/carisma/
-
(2015)
Carisma framework
-
-
-
6
-
-
84966338795
-
-
February
-
Cloud Security Alliance: The notorious nine cloud computing top threats in 2013, February 2013. https: //cloudsecurityalliance.org/download/the-notoriousnine- cloud-computing-top-threats-in-2013/
-
(2013)
The notorious nine cloud computing top threats in 2013
-
-
-
8
-
-
84976621811
-
-
Cloud Security Alliance: Cloud Control Matrix (2014). https: //downloads. cloudsecurityalliance.org/initiatives/ccm/ccm-v3.0.1.zip
-
(2014)
Cloud Control Matrix
-
-
-
9
-
-
84976628264
-
-
May
-
ClouDAT: Cloudat project, May 2015. http: //ti.uni-due.de/ti/clouddat/de/
-
(2015)
Cloudat project
-
-
-
11
-
-
77955959213
-
-
European Network and Information Security Agency: Cloud computing - benefits, risks and recommendations for information security (2009). https: //resilience. enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-bene fits-risks-and-recommendations-for-information-security
-
(2009)
Cloud computing - Benefits, risks and recommendations for information security
-
-
-
13
-
-
60849106337
-
Model-driven development for secure information systems
-
Fernández-Medina, E., Jürjens, J., Trujillo, J., Jajodia, S.: Model-driven development for secure information systems. Inf. Softw. Technol. 51(5), 809-814 (2009)
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 809-814
-
-
Fernández-Medina, E.1
Jürjens, J.2
Trujillo, J.3
Jajodia, S.4
-
16
-
-
84924425725
-
-
ISO 27001: 2013, International Organization for Standardization, Geneva, Switzerland, October
-
ISO: ISO/IEC 27001 Information Security Management System (ISMS) standard. ISO 27001: 2013, International Organization for Standardization, Geneva, Switzerland, October 2013
-
(2013)
ISO/IEC 27001 Information Security Management System (ISMS) standard
-
-
-
17
-
-
84976604668
-
-
ISO 27000: 2014, International Organization for Standardization, Geneva, Switzerland, May
-
ISO: ISO/IEC 27000 Information technology - Security techniques - Information security management systems, Overview and vocabulary. ISO 27000: 2014, International Organization for Standardization, Geneva, Switzerland, May 2014
-
(2014)
ISO/IEC 27000 Information technology - Security techniques - Information security management systems, Overview and vocabulary
-
-
-
18
-
-
84881151887
-
RABAC: Role-centric attribute-based access control
-
Kotenko, I., Skormin, V. (eds.), Springer, Heidelberg
-
Jin, X., Sandhu, R., Krishnan, R.: RABAC: role-centric attribute-based access control. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 84-96. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-33704-8 8
-
(2012)
MMM-ACNS 2012. LNCS
, vol.7531
, pp. 84-96
-
-
Jin, X.1
Sandhu, R.2
Krishnan, R.3
-
19
-
-
84885216103
-
Secure information flow for concurrent processes
-
Palamidessi, C. (ed.), Springer, Heidelberg
-
Jürjens, J.: Secure information flow for concurrent processes. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, p. 395. Springer, Heidelberg (2000)
-
(2000)
CONCUR 2000. LNCS
, vol.1877
, pp. 395
-
-
Jürjens, J.1
-
21
-
-
84891477511
-
-
Springer, New York, Chinese translation: Tsinghua University Press, Beijing 2009
-
Jürjens, J.: Secure Systems Development with UML. Springer, New York (2005). Chinese translation: Tsinghua University Press, Beijing 2009
-
(2005)
Secure Systems Development with UML
-
-
Jürjens, J.1
-
22
-
-
33745178885
-
Verification of low-level crypto-protocol implementations using automated theorem proving
-
Institute of Electrical and Electronics Engineers
-
Jürjens, J.: Verification of low-level crypto-protocol implementations using automated theorem proving. In: 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), pp. 89-98. Institute of Electrical and Electronics Engineers (2005)
-
(2005)
3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005)
, pp. 89-98
-
-
Jürjens, J.1
-
24
-
-
84904204049
-
Security modelling for electronic commerce: The common electronic purse specifications
-
Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.), Springer US, New York
-
Jürjens, J., Wimmel, G.: Security modelling for electronic commerce: the common electronic purse specifications. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) Towards the E-Society: E-Commerce, E-Business, and EGovernment. IFIP, vol. 74, pp. 489-505. Springer US, New York (2001)
-
(2001)
Towards the E-Society: E-Commerce, E-Business, and EGovernment. IFIP
, vol.74
, pp. 489-505
-
-
Jürjens, J.1
Wimmel, G.2
-
25
-
-
84856090651
-
-
Technical report, Special Publication 800-145 of the National Institute of Standards and Technology (NIST), September
-
National Institute for Standards and Technology: The NIST Definition of Cloud Computing. Technical report, Special Publication 800-145 of the National Institute of Standards and Technology (NIST), September 2011. http: //csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
-
(2011)
The NIST Definition of Cloud Computing
-
-
-
27
-
-
50249116269
-
Extracting domain ontologies from domain specific APIs
-
IEEE
-
Ratiu, D., Feilkas, M., Jürjens, J.: Extracting domain ontologies from domain specific APIs. In: 12th European Conference on Software Maintenance and Reengineering (CSMR 2008), pp. 203-212. IEEE (2008)
-
(2008)
12th European Conference on Software Maintenance and Reengineering (CSMR 2008)
, pp. 203-212
-
-
Ratiu, D.1
Feilkas, M.2
Jürjens, J.3
|