메뉴 건너뛰기




Volumn 97, Issue , 2016, Pages 84-93

An Integrated Meta-model for Cloud Application Security Modelling

Author keywords

cloud; control; DSL; meta model; metrics; model; requirements; rules; scalability; security

Indexed keywords

CLOUDS; CONTROL; DSL; MODELS; SEMANTICS;

EID: 84999025026     PISSN: None     EISSN: 18770509     Source Type: Conference Proceeding    
DOI: 10.1016/j.procs.2016.08.283     Document Type: Conference Paper
Times cited : (15)

References (21)
  • 1
    • 33344465743 scopus 로고    scopus 로고
    • Guest editor's introduction: Model-driven engineering
    • D.C. Schmidt Guest editor's introduction: Model-driven engineering Computer 39 2 2006 25 31 10.1109/MC.200658
    • (2006) Computer , vol.39 , Issue.2 , pp. 25-31
    • Schmidt, D.C.1
  • 3
    • 84856151079 scopus 로고    scopus 로고
    • Technical Report; European Network and Information. Security Agency; Heraklion, Crete, Greece
    • Catteddu, D., Hogben, G. Benefits, risks and recommendations for information security. Technical Report; European Network and Information. Security Agency; Heraklion, Crete, Greece; 2009. URL: https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/. files/ENISA%20Cloud%20Computing%20Security%20Risk%20Assessment.pdf.
    • (2009) Benefits, Risks and Recommendations for Information Security
    • Catteddu, D.1    Hogben, G.2
  • 4
    • 84924078610 scopus 로고    scopus 로고
    • Cloud Security Alliance Tech. Rep.
    • Cloud Security Alliance,. Cloud Control Matrix. Tech. Rep.; 2011. URL: https://cloudsecurityalliance.org/research/ccm/.
    • (2011) Cloud Control Matrix
  • 5
    • 84885817796 scopus 로고    scopus 로고
    • Joint Task Force Transformation Initiative Technical. Report. National Institute of Standards and Technology; USA
    • Joint Task Force Transformation Initiative,. Security and Privacy Controls for Federal Information Systems and Organizations. Technical. Report. National Institute of Standards and Technology; USA; 2013.
    • (2013) Security and Privacy Controls for Federal Information Systems and Organizations
  • 6
    • 0013137299 scopus 로고    scopus 로고
    • Object Management Group,. Object Constraint Language; 2014. http://www.omg.org/spec/OCL/2.4/.
    • (2014) Object Constraint Language
  • 10
    • 84940502079 scopus 로고    scopus 로고
    • Cloud Select Industry Group (C-SIG) Technical Report
    • Cloud Select Industry Group (C-SIG),. Cloud Service Level Agreement Standardization Guidelines. Technical Report; 2014. URL:. http://ec.europa.eu/information-society/newsroom/cf/dae/document.cfm?action=display&doc-id=6138.
    • (2014) Cloud Service Level Agreement Standardization Guidelines
  • 11
    • 84902350582 scopus 로고    scopus 로고
    • D2.1: Security-aware SLA specification language and cloud security dependency model
    • A. Pannetrat D2.1: Security-aware SLA specification language and cloud security dependency model Cumulus Project Deliverable 2013
    • (2013) Cumulus Project Deliverable
    • Pannetrat, A.1
  • 12
    • 84867659938 scopus 로고    scopus 로고
    • Measurement Frameworks and Metrics for Resilient Networks and Services
    • P. Trimintzios Measurement Frameworks and Metrics for Resilient Networks and Services Technical Report; 2011
    • (2011) Technical Report
    • Trimintzios, P.1
  • 13
    • 84978961430 scopus 로고    scopus 로고
    • The Center for Internet Security Technical Report 28; USA
    • The Center for Internet Security,. The CIS security metrics v.1.10. Technical Report 28; USA; 2010. URL: https://buildsecurityin. us-cert.gov/sites/default/files/CIS-Security-Metrics-v1.0.0.pdf.
    • (2010) The CIS Security Metrics v.1.10
  • 15
    • 77949632117 scopus 로고    scopus 로고
    • Quantification of security for compute intensive workloads in clouds
    • J. Arshad, P. Townend, and J. Xu Quantification of security for compute intensive workloads in clouds ICPADS. IEEE; 2009 479 486
    • (2009) ICPADS. IEEE , pp. 479-486
    • Arshad, J.1    Townend, P.2    Xu, J.3
  • 16
  • 17
    • 74049147592 scopus 로고    scopus 로고
    • Formalizing Information Security Knowledge. In: ASIACCS. Sydney
    • S. Fenz, and A. Ekelhart Formalizing Information Security Knowledge. In: ASIACCS. Sydney Australia: ACM 2009 183 194
    • (2009) Australia: ACM , pp. 183-194
    • Fenz, S.1    Ekelhart, A.2
  • 18
    • 77954700790 scopus 로고    scopus 로고
    • Ontology-based Generation of IT-security Metrics. In: SAC. Sierre
    • S. Fenz Ontology-based Generation of IT-security Metrics. In: SAC. Sierre Switzerland: ACM 2010 1833 1839
    • (2010) Switzerland: ACM , pp. 1833-1839
    • Fenz, S.1
  • 20
    • 84898843700 scopus 로고    scopus 로고
    • Adaptable, model-driven security engineering for saas cloud-based applications
    • M. Almorsy, J. Grundy, and A. Ibrahim Adaptable, model-driven security engineering for saas cloud-based applications Automated Software. Engineering 21 2 2014 187 224 10.1007/s10515-013-z 0133
    • (2014) Automated Software. Engineering , vol.21 , Issue.2 , pp. 187-224
    • Almorsy, M.1    Grundy, J.2    Ibrahim, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.