Data Risks in the Cloud
暂无分享,去创建一个
[1] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[2] Roger Clarke. The Cloudy Future of Consumer Computing , 2011, Bled eConference.
[3] J. Initiative. SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View , 2011 .
[4] Roger Clarke,et al. A Framework for the Evaluation o f CloudSourcing Proposals , 2012, Bled eConference.
[5] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[6] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[7] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[8] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[9] David K. Chiabi. European Telecommunications Standards Institute , 2015 .
[10] David Molnar,et al. Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud , 2010, WEIS.
[11] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[12] Indrit Troshani,et al. Cloud Nine? An Integrative Risk Management Framework for Cloud Computing , 2011, Bled eConference.
[13] Roger Clarke,et al. Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective , 2010, Bled eConference.
[14] Alexander Benlian,et al. Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development , 2012, ICIS.
[15] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[16] Daniele Catteddu and Giles Hogben. Cloud Computing. Benefits, risks and recommendations for information security , 2009 .
[17] Ralf Steinmetz,et al. European Conference on Information Systems ( ECIS ) Summer 10-6-2011 TAXONOMY OF TECHNOLOGICAL IT OUTSOURCING RISKS : SUPPORT FOR RISK IDENTIFICATION AND QUANTIFICATION , 2017 .
[18] Susan P. Williams,et al. Managing Information Risks and Protecting Information Assets in a Web 2.0 Era , 2010, Bled eConference.
[19] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[20] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[21] Donald Firesmith,et al. Specifying Reusable Security Requirements , 2004, J. Object Technol..
[22] Harry Eugene Stanley,et al. Catastrophic cascade of failures in interdependent networks , 2009, Nature.
[23] Roger Clarke. How reliable is cloudsourcing? A review of articles in the technical media 2005-11 , 2012, Comput. Law Secur. Rev..
[24] Roger Clarke,et al. A Framework for the Evaluation of CloudSourcing Proposals , 2012 .
[25] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .