메뉴 건너뛰기




Volumn 1, Issue , 2016, Pages 327-332

Methodology to obtain the security controls in multi-cloud applications

Author keywords

Cyber security Methodologies; Multi cloud; Security by design; Threat Modelling

Indexed keywords

CLOUD COMPUTING; RISK ASSESSMENT;

EID: 84979747685     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.5220/0005912603270332     Document Type: Conference Paper
Times cited : (9)

References (30)
  • 1
    • 85184840384 scopus 로고    scopus 로고
    • Towards a model-driven provisioning, deployment, monitoring, and adaptation of multi-cloud systems
    • June In Cloud Computing (CLOUD), IEEE
    • Ferry, N., Rossini, A., Chauvel, F., Morin, B., & Solberg, A. (2013, June). Towards a model-driven provisioning, deployment, monitoring, and adaptation of multi-cloud systems. In Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on (pp. 887-894). IEEE.
    • (2013) 2013 IEEE Sixth International Conference on , pp. 887-894
    • Ferry, N.1    Rossini, A.2    Chauvel, F.3    Morin, B.4    Solberg, A.5
  • 3
    • 70349755377 scopus 로고    scopus 로고
    • Blueprint for the intercloudprotocols and formats for cloud computing interoperability
    • May In Internet and Web Applications and Services, 2009 IEEE
    • Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., & Morrow, M. (2009, May). Blueprint for the intercloudprotocols and formats for cloud computing interoperability. In Internet and Web Applications and Services, 2009. ICIW'09. Fourth International Conference on (pp. 328-336). IEEE.
    • (2009) ICIW'09. Fourth International Conference on , pp. 328-336
    • Bernstein, D.1    Ludvigson, E.2    Sankar, K.3    Diamond, S.4    Morrow, M.5
  • 4
    • 77957951132 scopus 로고    scopus 로고
    • How to enhance cloud architectures to enable cross-federation
    • July Cloud Computing (CLOUD)
    • Celesti, A., Tusa, F., Villari, M., & Puliafito, A. (2010, July). How to enhance cloud architectures to enable cross-federation. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 337-345). IEEE.
    • (2010) 2010 IEEE 3rd International Conference on , pp. 337-345
    • Celesti, A.1    Tusa, F.2    Villari, M.3    Puliafito, A.4
  • 7
    • 84893754378 scopus 로고    scopus 로고
    • Inter-Cloud architectures and application brokering: Taxonomy and survey
    • Nikolay Grozev and Buyya, R. (2012). Inter-Cloud architectures and application brokering: taxonomy and survey. Software - Practice and Experience, 44(3):369-390.
    • (2012) Software - Practice and Experience , vol.44 , Issue.3 , pp. 369-390
    • Grozev, N.1    Buyya, R.2
  • 16
    • 84885645251 scopus 로고    scopus 로고
    • Experiences threat modeling at Microsoft
    • Shostack, A. (2008). Experiences threat modeling at Microsoft. CEUR Workshop Proceedings, 413:1{11.
    • (2008) CEUR Workshop Proceedings , vol.413 , Issue.1 , pp. 11
    • Shostack, A.1
  • 21
    • 84964822727 scopus 로고    scopus 로고
    • Security requirements for the rest of us: A survey
    • Tondel, I. A., Jaatun, M. G., and Meland, P. H. (2008). Security requirements for the rest of us: A survey. IEEE Software, 25(1):20-27.
    • (2008) IEEE Software , vol.25 , Issue.1 , pp. 20-27
    • Tondel, I.A.1    Jaatun, M.G.2    Meland, P.H.3
  • 22
    • 84979761212 scopus 로고    scopus 로고
    • Open Web Application Security Project (OWASP). Application Threat Modeling. Available at: https://www.owasp.org/index.php/Application-Threat-Modeling
    • Application Threat Modeling
  • 23
    • 84962219790 scopus 로고    scopus 로고
    • EU directive 95/46/EC. Available at: http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
    • EU Directive 95/46/EC
  • 25
    • 84971348067 scopus 로고    scopus 로고
    • SP 800-53 Rev.4 - Security and Privacy Controls for Federal Information Systems and Organizations
    • National Institute of Standards and Technology (NIST), "SP 800-53 Rev.4 - Security and Privacy Controls for Federal Information Systems and Organizations," Natl. Inst. Stand. Technol. - Spec. Publ., vol. 800-53, pp. 1-460, 2014.
    • (2014) Natl. Inst. Stand. Technol. , vol.800 , Issue.53 , pp. 1-460
  • 26
    • 84864535108 scopus 로고    scopus 로고
    • Aug.
    • Cloud Security Alliance, "Cloud Controls Matrix, Version 1.2", Aug. 2011; https://cloudsecurityalliance.org/research/initiativesccm.
    • (2011) Cloud Controls Matrix, Version 1.2
  • 28
    • 84937690427 scopus 로고    scopus 로고
    • Leveraging the potential of cloud security service level agreements through standards
    • July
    • Jesus Luna, Neeraj Suri, Michaela Iorga and Anil Kamel, "Leveraging the Potential of Cloud Security Service Level Agreements through Standards", IEEE Cloud Computing Magazine, Volume 2, Issue 3, Pages 32-40, July 2015
    • (2015) IEEE Cloud Computing Magazine , vol.2 , Issue.3 , pp. 32-40
    • Luna, J.1    Suri, N.2    Iorga, M.3    Kamel, A.4
  • 29
    • 85037028287 scopus 로고    scopus 로고
    • SLA-based secure cloud application development: The SPECS framework
    • 21-22 September
    • Valentina Casola, Alessandra De benedictis, Massimiliano Rak and Umberto Villano, "SLA-based Secure Cloud Application Development: the SPECS Framework", In MICAS 2015, Timisoara, 21-22 September 2015.
    • (2015) MICAS 2015, Timisoara
    • Casola, V.1    De Benedictis, A.2    Rak, M.3    Villano, U.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.