-
1
-
-
33344465743
-
Guest editor's introduction: Model-driven engineering
-
D.C. Schmidt Guest editor's introduction: Model-driven engineering Computer 39 2 2006 25 31 10.1109/MC.200658
-
(2006)
Computer
, vol.39
, Issue.2
, pp. 25-31
-
-
Schmidt, D.C.1
-
2
-
-
84878580077
-
Models@run.time (dagstuhl seminar 11481)
-
U. Amann, N. Bencomo, B.H.C. Cheng, and R.B. France Models@run.time (dagstuhl seminar 11481) Dagstuhl Reports 1 11 2011 91 123
-
(2011)
Dagstuhl Reports
, vol.1
, Issue.11
, pp. 91-123
-
-
Amann, U.1
Bencomo, N.2
Cheng, B.H.C.3
France, R.B.4
-
3
-
-
84856151079
-
-
Technical Report; European Network and Information. Security Agency; Heraklion, Crete, Greece
-
Catteddu, D., Hogben, G. Benefits, risks and recommendations for information security. Technical Report; European Network and Information. Security Agency; Heraklion, Crete, Greece; 2009. URL: https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/. files/ENISA%20Cloud%20Computing%20Security%20Risk%20Assessment.pdf.
-
(2009)
Benefits, Risks and Recommendations for Information Security
-
-
Catteddu, D.1
Hogben, G.2
-
4
-
-
84924078610
-
-
Cloud Security Alliance Tech. Rep.
-
Cloud Security Alliance,. Cloud Control Matrix. Tech. Rep.; 2011. URL: https://cloudsecurityalliance.org/research/ccm/.
-
(2011)
Cloud Control Matrix
-
-
-
5
-
-
84885817796
-
-
Joint Task Force Transformation Initiative Technical. Report. National Institute of Standards and Technology; USA
-
Joint Task Force Transformation Initiative,. Security and Privacy Controls for Federal Information Systems and Organizations. Technical. Report. National Institute of Standards and Technology; USA; 2013.
-
(2013)
Security and Privacy Controls for Federal Information Systems and Organizations
-
-
-
6
-
-
0013137299
-
-
Object Management Group,. Object Constraint Language; 2014. http://www.omg.org/spec/OCL/2.4/.
-
(2014)
Object Constraint Language
-
-
-
10
-
-
84940502079
-
-
Cloud Select Industry Group (C-SIG) Technical Report
-
Cloud Select Industry Group (C-SIG),. Cloud Service Level Agreement Standardization Guidelines. Technical Report; 2014. URL:. http://ec.europa.eu/information-society/newsroom/cf/dae/document.cfm?action=display&doc-id=6138.
-
(2014)
Cloud Service Level Agreement Standardization Guidelines
-
-
-
11
-
-
84902350582
-
D2.1: Security-aware SLA specification language and cloud security dependency model
-
A. Pannetrat D2.1: Security-aware SLA specification language and cloud security dependency model Cumulus Project Deliverable 2013
-
(2013)
Cumulus Project Deliverable
-
-
Pannetrat, A.1
-
12
-
-
84867659938
-
Measurement Frameworks and Metrics for Resilient Networks and Services
-
P. Trimintzios Measurement Frameworks and Metrics for Resilient Networks and Services Technical Report; 2011
-
(2011)
Technical Report
-
-
Trimintzios, P.1
-
13
-
-
84978961430
-
-
The Center for Internet Security Technical Report 28; USA
-
The Center for Internet Security,. The CIS security metrics v.1.10. Technical Report 28; USA; 2010. URL: https://buildsecurityin. us-cert.gov/sites/default/files/CIS-Security-Metrics-v1.0.0.pdf.
-
(2010)
The CIS Security Metrics v.1.10
-
-
-
14
-
-
70350663440
-
Performance measurement guide for information security
-
E. Chew, M. Swanson, K. Stine, N. Bartol, A. Brown, and W. Robinson Performance measurement guide for information security Technical Report; National Institute of Standards and Technology; USA; 2008
-
(2008)
Technical Report; National Institute of Standards and Technology; USA
-
-
Chew, E.1
Swanson, M.2
Stine, K.3
Bartol, N.4
Brown, A.5
Robinson, W.6
-
15
-
-
77949632117
-
Quantification of security for compute intensive workloads in clouds
-
J. Arshad, P. Townend, and J. Xu Quantification of security for compute intensive workloads in clouds ICPADS. IEEE; 2009 479 486
-
(2009)
ICPADS. IEEE
, pp. 479-486
-
-
Arshad, J.1
Townend, P.2
Xu, J.3
-
17
-
-
74049147592
-
Formalizing Information Security Knowledge. In: ASIACCS. Sydney
-
S. Fenz, and A. Ekelhart Formalizing Information Security Knowledge. In: ASIACCS. Sydney Australia: ACM 2009 183 194
-
(2009)
Australia: ACM
, pp. 183-194
-
-
Fenz, S.1
Ekelhart, A.2
-
18
-
-
77954700790
-
Ontology-based Generation of IT-security Metrics. In: SAC. Sierre
-
S. Fenz Ontology-based Generation of IT-security Metrics. In: SAC. Sierre Switzerland: ACM 2010 1833 1839
-
(2010)
Switzerland: ACM
, pp. 1833-1839
-
-
Fenz, S.1
-
19
-
-
84999020240
-
D3.2: Security Ontology Definition
-
C. Basile, J. Silvestro, A. Lioy, D. Canavese, M.A. Neri, S. Paraboschi, and et al. D3.2: Security Ontology Definition PoSecCo Project. Deliverable 2011
-
(2011)
PoSecCo Project. Deliverable
-
-
Basile, C.1
Silvestro, J.2
Lioy, A.3
Canavese, D.4
Neri, M.A.5
Paraboschi, S.6
-
20
-
-
84898843700
-
Adaptable, model-driven security engineering for saas cloud-based applications
-
M. Almorsy, J. Grundy, and A. Ibrahim Adaptable, model-driven security engineering for saas cloud-based applications Automated Software. Engineering 21 2 2014 187 224 10.1007/s10515-013-z 0133
-
(2014)
Automated Software. Engineering
, vol.21
, Issue.2
, pp. 187-224
-
-
Almorsy, M.1
Grundy, J.2
Ibrahim, A.3
-
21
-
-
84899712065
-
-
IEEE Computer Society Washington, DC, USA 978-0-7695-5095-4
-
D. NuÌnez, C. Fernandez-Gago, S. Pearson, and M. Felici A metamodel for measuring accountability attributes in the cloud. CLOUDCOM. 2013 IEEE Computer Society Washington, DC, USA 978-0-7695-5095-4 355 362
-
(2013)
A Metamodel for Measuring Accountability Attributes in the Cloud. CLOUDCOM.
, pp. 355-362
-
-
Nuìnez, D.1
Fernandez-Gago, C.2
Pearson, S.3
Felici, M.4
|