Design and implementation of the advanced cloud privacy threat modeling

Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured ...

[1]  Jung-Soo Han,et al.  Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario , 2011, ICITCS.

[2]  Bruce Schneier Threat Modeling and Risk Assessment , 2000 .

[3]  Erwin Laure,et al.  Privacy Threat Modeling for Emerging BiobankClouds , 2014, EUSPN/ICTH.

[4]  Sjaak Brinkkemper,et al.  Method engineering: engineering of information systems development methods and tools , 1996, Inf. Softw. Technol..

[5]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[6]  Eric Kuada,et al.  Security and Trust in Cloud Computing , 2017 .

[7]  Frank Swiderski,et al.  Threat Modeling , 2018, Hacking Connected Cars.

[8]  Sophie Stalla-Bourdillon Liability Exemptions Wanted! Internet Intermediaries’ Liability under UK Law , 2012 .

[9]  Yue Chen,et al.  Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems , 2007, 29th International Conference on Software Engineering (ICSE'07 Companion).

[10]  Alysson Neves Bessani,et al.  BiobankCloud: A Platform for the Secure Storage, Sharing, and Processing of Large Biomedical Data Sets , 2015, Big-O/DMAH@VLDB.

[11]  Fang Liu,et al.  NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.

[12]  Raman Ramsin,et al.  Designing an agile methodology for mobile software development: A hybrid method engineering approach , 2008, 2008 Second International Conference on Research Challenges in Information Science.

[13]  Colette Rolland,et al.  Towards a Generic Model for Situational Method Engineering , 2003, CAiSE.

[14]  Erwin Laure,et al.  BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD , 2016 .

[15]  Jim Dowling,et al.  A security framework for population-scale genomics analysis , 2015, 2015 International Conference on High Performance Computing & Simulation (HPCS).

[16]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[17]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[18]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[19]  E. Merzari,et al.  Large-Scale Simulations on Thermal-Hydraulics in Fuel Bundles of Advanced Nuclear Reactors , 2007 .

[20]  C M Faddick Health care fraud and abuse: new weapons, new penalties, and new fears for providers created by the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"). , 1997, Annals of health law.

[21]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[22]  Erwin Laure,et al.  Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments , 2015, NeTCoM 2015.