Migrating into the Cloud: Identifying the Major Security and Privacy Concerns
暂无分享,去创建一个
[1] Haralambos Mouratidis,et al. Aligning Security and Privacy to Support the Development of Secure Information Systems , 2012, J. Univers. Comput. Sci..
[2] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[3] Haralambos Mouratidis,et al. Security Attack Testing (SAT) - testing the security of information systems at design time , 2007, Inf. Syst..
[4] Evangelia Kavakli,et al. Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering , 2009, MCIS.
[5] Peng Ning,et al. Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.
[6] S. Gritzalis,et al. Dealing with privacy issues during the system design process , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[7] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[8] Stefanos Gritzalis,et al. Incorporating privacy requirements into the system design process: The PriS conceptual framework , 2006, Internet Res..
[9] Stefanos Gritzalis,et al. PriS Methodology: Incorporating Privacy Requirements into the System Design Process , 2005 .
[10] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..