-
2
-
-
77954051808
-
The NIST definition of cloud computing
-
Mell P. Grance T.: 'The NIST definition of cloud computing. ', Natl. Inst. Stand. Technol., 2009, 53, (6), p. 50
-
(2009)
Natl. Inst. Stand. Technol.
, vol.53
, Issue.6
, pp. 50
-
-
Mell, P.1
Grance, T.2
-
4
-
-
85067514029
-
-
Northbridge accessed October 2018
-
Northbridge: '2016 future of cloud computing study. '. Available at https://www.slideshare.net/North-Bridge/2016-future-of-cloud-computing-study, accessed October 2018, 2016
-
(2016)
2016 Future of Cloud Computing Study
-
-
-
5
-
-
85044394375
-
-
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) L119, 1-88, May
-
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union, L119, pp. 1-88, May 2016
-
(2016)
Official Journal of the European Union
-
-
-
6
-
-
84901427258
-
A survey on trust management for Internet of things
-
Yan Z. Zhang P. Vasilakos A.V.: 'A survey on trust management for Internet of things. ', J. Netw. Comput. Appl., 2014, 42, pp. 120-134
-
(2014)
J. Netw. Comput. Appl.
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
7
-
-
84966628704
-
Supporting cloud service selection with a risk-driven cost-benefit analysis
-
Celesti A. Leitner (Eds.): (Cham Springer International Publishing, Switzerland)
-
Omerovic A.: 'Supporting cloud service selection with a risk-driven cost-benefit analysis'. In Celesti A. Leitner P. (Eds.): 'Advances in service-oriented and cloud computing ' (Cham Springer International Publishing, Switzerland, 2016), pp. 166-174
-
(2016)
Advances in Service-oriented and Cloud Computing
, pp. 166-174
-
-
Omerovic, A.1
-
12
-
-
84929324916
-
-
(Springer-Verlag, New York, NY, USA)
-
Wallmüller E.: 'Business continuity. Chapter risk management for IT and software projects ' (Springer-Verlag, New York, NY, USA, 2002), pp. 165-178
-
(2002)
Business Continuity. Chapter Risk Management for IT and Software Projects
, pp. 165-178
-
-
Wallmüller, E.1
-
13
-
-
85067497789
-
Study of existing risk management models and prior research contribution
-
Rao L.M. Firdose S.: 'Study of existing risk management models and prior research contribution. ', Adarsh J. Inf. Technol., 2016, 4, (1), pp. 10-20
-
(2016)
Adarsh J. Inf. Technol.
, vol.4
, Issue.1
, pp. 10-20
-
-
Rao, L.M.1
Firdose, S.2
-
14
-
-
17844381878
-
ISRAM: Information security risk analysis method
-
Karabacak B. Sogukpinar I.: 'ISRAM: information security risk analysis method. ', Comput. Secur., 2005, 24, (2), pp. 147-159
-
(2005)
Comput. Secur.
, vol.24
, Issue.2
, pp. 147-159
-
-
Karabacak, B.1
Sogukpinar, I.2
-
17
-
-
85067455747
-
-
The STRIDE Threat Model accessed 09 May 2017
-
The STRIDE Threat Model. Available at https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx,. accessed 09 May 2017
-
-
-
-
18
-
-
0005914572
-
-
OWASP Foundation:, accessed online 05 November 2013
-
OWASP Foundation: 'Technical report. ', 2013,. accessed online 05 November 2013
-
(2013)
Technical Report
-
-
-
20
-
-
85042113676
-
A critical analysis of software risk management techniques in large scale systems
-
Pasha M. Qaiser G. Pasha U.: 'A critical analysis of software risk management techniques in large scale systems. ', IEEE Access., 2018, 6, pp. 12412-12424
-
(2018)
IEEE Access.
, vol.6
, pp. 12412-12424
-
-
Pasha, M.1
Qaiser, G.2
Pasha, U.3
-
22
-
-
84938118274
-
The NERV methodology: A lightweight process for addressing non-functional requirements in agile software development
-
April
-
Domah D. Mitropoulos F.J.: 'The NERV methodology: a lightweight process for addressing non-functional requirements in agile software development. '. In SoutheastCon 2015, April 2015, pp. 1-7
-
(2015)
SoutheastCon 2015
, pp. 1-7
-
-
Domah, D.1
Mitropoulos, F.J.2
-
23
-
-
84874617141
-
The normap methodology: Lightweight engineering of non-functional requirements for agile processes
-
Farid W.M.: 'The normap methodology: lightweight engineering of non-functional requirements for agile processes. '. In 2012 19th Asia-Pacific Software Engineering Conf., 2012,. vol. 1
-
(2012)
2012 19th Asia-Pacific Software Engineering Conf
, vol.1
-
-
Farid, W.M.1
-
24
-
-
84964818571
-
-
(Springer International Publishing, Cham)
-
Moran A.: 'Applying agile risk management ' (Springer International Publishing, Cham, 2014), pp. 61-85
-
(2014)
Applying Agile Risk Management
, pp. 61-85
-
-
Moran, A.1
-
25
-
-
84926138086
-
-
(Springer International Publishing, Berlin, Germany)
-
Moran A.: 'Agile risk management ' (Springer International Publishing, Berlin, Germany, 2014)
-
(2014)
Agile Risk Management
-
-
Moran, A.1
-
27
-
-
84925130665
-
Why and how should open source projects adopt time-based releases?
-
Michlmayr M. Fitzgerald B. Stol K.J.: 'Why and how should open source projects adopt time-based releases? ', IEEE Softw., 2015, 32, (2), pp. 55-63
-
(2015)
IEEE Softw.
, vol.32
, Issue.2
, pp. 55-63
-
-
Michlmayr, M.1
Fitzgerald, B.2
Stol, K.J.3
-
28
-
-
84888645752
-
Modeling continuous integration practice differences in industry software development
-
Ståhl D. Bosch J.: 'Modeling continuous integration practice differences in industry software development. ', J. Syst. Softw., 2014, 87, pp. 48-59
-
(2014)
J. Syst. Softw.
, vol.87
, pp. 48-59
-
-
Ståhl, D.1
Bosch, J.2
-
29
-
-
84937109068
-
Continuous software engineering: A roadmap and agenda
-
Fitzgerald B. Stol K.-J.: 'Continuous software engineering: a roadmap and agenda. ', J. Syst. Softw., 2017, 123, pp. 176-189
-
(2017)
J. Syst. Softw.
, vol.123
, pp. 176-189
-
-
Fitzgerald, B.1
Stol, K.-J.2
-
32
-
-
33745794661
-
Customising agile methods to software practices at Intel Shannon
-
Fitzgerald B. Hartnett G. Conboy K.: 'Customising agile methods to software practices at Intel Shannon. ', Eur. J. Inf. Syst., 2006, 15, (2), pp. 200-213
-
(2006)
Eur. J. Inf. Syst.
, vol.15
, Issue.2
, pp. 200-213
-
-
Fitzgerald, B.1
Hartnett, G.2
Conboy, K.3
-
35
-
-
85009204967
-
A risk management framework for distributed agile projects
-
Shrivastava S.V. Rathod U.: 'A risk management framework for distributed agile projects. ', Inf. Softw. Technol., 2017, 85, pp. 1-15
-
(2017)
Inf. Softw. Technol.
, vol.85
, pp. 1-15
-
-
Shrivastava, S.V.1
Rathod, U.2
-
36
-
-
85030782327
-
Decision support system for risk assessment and management strategies in distributed software development
-
Aslam A. Ahmad N. Saba T.: 'Decision support system for risk assessment and management strategies in distributed software development. ', IEEE Access., 2017, 5, pp. 20349-20373
-
(2017)
IEEE Access.
, vol.5
, pp. 20349-20373
-
-
Aslam, A.1
Ahmad, N.2
Saba, T.3
-
37
-
-
79952561212
-
An ecosystem for continuously secure application software
-
Merkow M. Raghavan L.: 'An ecosystem for continuously secure application software. '. RUGGED Software, CrossTalk, March/April 2011
-
(2011)
RUGGED Software, CrossTalk
-
-
Merkow, M.1
Raghavan, L.2
-
38
-
-
85067517378
-
Equivalence of risk: A mathematical approach
-
Las Vegas, NV
-
Banerjee A.: 'Equivalence of risk: a mathematical approach. '. Proc. 29th Int. System Safety Conf., Las Vegas, NV, 2011, pp. 8-12
-
(2011)
Proc. 29th Int. System Safety Conf.
, pp. 8-12
-
-
Banerjee, A.1
-
40
-
-
80053153230
-
Elastically ruling the cloud: Specifying application's behavior in federated clouds
-
July
-
Morán D. Vaquero L.M. Galán F.: 'Elastically ruling the cloud: specifying application's behavior in federated clouds. '. 2011 IEEE Fourth Int. Conf. Cloud Computing, July 2011, pp. 89-96
-
(2011)
2011 IEEE Fourth Int. Conf. Cloud Computing
, pp. 89-96
-
-
Morán, D.1
Vaquero, L.M.2
Galán, F.3
-
45
-
-
85067435544
-
-
OWASP Risk Rating Methodology accessed 09 May 2018
-
OWASP Risk Rating Methodology. Available at https://www.owasp.org/index.php/OWASP-Risk-Rating-Methodology, accessed 09 May 2018
-
-
-
-
46
-
-
85067492512
-
-
The OWASP Top 10 accessed 09 May 2018
-
The OWASP Top 10. Available at https://www.owasp.org/index.php/Category: OWASP-Top-Ten-Project,. accessed 09 May 2018
-
-
-
-
48
-
-
85067489600
-
-
Cloud Security Alliance accessed October 2018
-
Cloud Security Alliance: 'Cloud control matrix. '. Available at https://cloudsecurityalliance.org/group/cloud-controls-matrix/, accessed October 2018
-
Cloud Control Matrix
-
-
-
49
-
-
84969792687
-
Towards self-protective multi-cloud applications - MUSA - a holistic framework to support the security-intelligent lifecycle management of multi-cloud applications
-
Rios E. Iturbe E. Arrieta L.O.-E.: 'Towards self-protective multi-cloud applications-MUSA-a holistic framework to support the security-intelligent lifecycle management of multi-cloud applications. '. CLOSER, 2015
-
(2015)
CLOSER
-
-
Rios, E.1
Iturbe, E.2
Arrieta, L.O.-E.3
|