Data Privacy in Cloud Computing - An Empirical Study in the Financial Industry
暂无分享,去创建一个
Ulrich Lampe | Alexander Müller | Olga Wenge | Ralf Schaarschmidt | Olga Wenge | Ulrich Lampe | Alexander Müller | Ralf Schaarschmidt
[1] Martin Knahl,et al. Sicherheitsprobleme für IT-Outsourcing durch Cloud Computing , 2014, HMD Praxis der Wirtschaftsinformatik.
[2] Ulrich Lampe,et al. On the Relevance of Security Risks for Cloud Adoption in the Financial Industry , 2013, AMCIS.
[3] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[4] Haiyan Zhan,et al. Applying cloud computing in financial service industry , 2010, 2010 International Conference on Intelligent Control and Information Processing.
[5] S. K. Dubey,et al. Security and Privacy in Cloud Computing: A Survey , 2013 .
[6] Michael Amberg,et al. IT-Outsourcing & Compliance , 2013, HMD Praxis der Wirtschaftsinformatik.
[7] Sylwia Męcfal. Recenzja książki. Robert K. yin, Case Study Research. Design and Methods (fourth Edition), thousand Oaks, CA: Sage Publications, 2009 , 2012 .
[8] Christoph Heinle,et al. IaaS Adoption Determinants in Enterprises , 2010, GECON.
[9] Paula Kotzé,et al. Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.
[10] Jochen Gläser,et al. Experteninterviews und qualitative Inhaltsanalyse , 2010 .
[11] Marten van Dijk,et al. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.
[12] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[13] Deborah Bunker,et al. An Empirical Analysis of Cloud, Mobile, Social and Green Computing: Financial Services IT Strategy and Enterprise Architecture , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[14] Graeme G. Shanks,et al. Successfully completing case study research: combining rigour, relevance and pragmatism , 1998, Inf. Syst. J..
[15] Javier González,et al. Multi-layer Monitoring for Cloud Computing , 2011, 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering.
[16] Anonymisierung von Unternehmensdaten: Ein Überblick und beispielhafte Darstellung anhand des Mannheimer Innovationspanels , 2002 .
[17] Nico d'Heureuse,et al. Towards holistic multi-tenant monitoring for virtual data centers , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.
[18] James Michael Stewart,et al. CISSP: Certified Information Systems Security Professional Study Guide, 2nd Edition , 2004 .
[19] Eric Conrad,et al. CISSP Study Guide , 2010 .
[20] Stephan Sädtler. Aktuelle Rechtsfragen des Datenschutzes und der Datensicherheit im Cloud Computing , 2013, PIK Prax. Informationsverarbeitung Kommun..
[21] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[22] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[23] Alexander Benlian,et al. Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development , 2012, ICIS.
[24] Christine Nadel,et al. Case Study Research Design And Methods , 2016 .
[25] Markus Kucera,et al. Sicherheitsherausforderungen in hochverteilten Systemen , 2013, Prax. Inf.verarb. Kommun..
[26] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.