Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
Tài liệu tham khảo
2009
Cloud Security Alliance
Pearson, 2010, Privacy, security and trust issues arising from cloud computing, 693
Cloud Computing, 2011
Cloud Security Alliance
2012
Heiser, 2008, Assessing the Security Risks of Cloud Computing
Baburajan, 2011
Kerravala, 2011
2008
“Jeff Bezos' Risky Bet”, Business Week, http://www.businessweek.com/stories/2006-11-12/jeff-bezos-risky-bet, (Last access 09/01/2013).
King, Rachael, Cloud computing: small companies take flight, http://www.businessweek.com/stories/2008-08-04/cloud-computing-small-companies-take-flightbusinessweek-business-news-stock-market-and-financial-advice Businessweek. (Last access 09/12/2012).
Defining and Measuring Cloud Elasticity, KIT Software Quality Departement. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000023476. (Last access 13/08/2012).
Economies of Cloud Scale Infrastructure, 2011
Farber, Dan. The new geek chic: data centers. http://news.cnet.com/8301-13953_3-9977049-80.html CNET News. (Last access 22/08/2012).
Kitchenham, 2007, Guidelines for performing systematic literature reviews in software engineering, version 2.3
Yu, 2010, A view about cloud data security from data life cycle, 1
Sabahi, 2011, Cloud computing threats and responses
Grobauer, 2010, Towards incident handling in the cloud: challenges and approaches, 77, 10.1145/1866835.1866850
Wei, 2009, Managing security of virtual machine images in a cloud environment, 91, 10.1145/1655008.1655021
Ristenpart, 2009, Hey, You, get off of my cloud: exploring information leakage in third-party compute clouds, 199, 10.1145/1653662.1653687
Grance, 2011
Kalloniatis, 2005, PriS methodology: incorporating privacy requirements into the system design process
Kavakli, 2006, Incorporating privacy requirements into the system design process: the PriS conceptual framework, vol. 16, No 2, 140
Houmb, 2010, 15(1), 63
2010, “Cloud security and privacy: what is the data life cycle?”
1995
Cannon, 2004
Fischer-Hübner, 2001, vol. 1958
Pfitzmann, 1990, Rechsicherheit trotz Anonymität in offenen digitalen Systemen, Datenschutz Datensicherheit (DuD), 6, 243
Pfitzmann, 1990, 234
Mouratidis, 2006, Secure Tropos: a security-oriented extension of the Tropos methodology
Kalloniatis, 2009, Methods for designing privacy aware information systems: a review, 185
Mulazzani, 2011, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
