Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts

Computer Standards & Interfaces - Tập 36 - Trang 759-775 - 2014
Christos Kalloniatis1, Haralambos Mouratidis2, Manousakis Vassilis1, Shareeful Islam2, Stefanos Gritzalis3, Evangelia Kavakli1
1Cultural Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, University Hill, GR81100 Mytilene, Greece
2School of Architecture, Computing and Engineering, University of East London, UK
3Information and Communication Systems Security Laboratory, Department of Information and Communications Systems Engineering, University of the Aegean, GR83200 Samos, Greece

Tài liệu tham khảo

2009

Cloud Security Alliance

Pearson, 2010, Privacy, security and trust issues arising from cloud computing, 693

Cloud Computing, 2011

Cloud Security Alliance

2012

Heiser, 2008, Assessing the Security Risks of Cloud Computing

Baburajan, 2011

Kerravala, 2011

Voorsluys, 2011, Introduction to cloud computing, 1, 10.1002/9780470940105.ch1

2008

“Jeff Bezos' Risky Bet”, Business Week, http://www.businessweek.com/stories/2006-11-12/jeff-bezos-risky-bet, (Last access 09/01/2013).

King, Rachael, Cloud computing: small companies take flight, http://www.businessweek.com/stories/2008-08-04/cloud-computing-small-companies-take-flightbusinessweek-business-news-stock-market-and-financial-advice Businessweek. (Last access 09/12/2012).

Defining and Measuring Cloud Elasticity, KIT Software Quality Departement. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000023476. (Last access 13/08/2012).

Economies of Cloud Scale Infrastructure, 2011

Farber, Dan. The new geek chic: data centers. http://news.cnet.com/8301-13953_3-9977049-80.html CNET News. (Last access 22/08/2012).

Kitchenham, 2007, Guidelines for performing systematic literature reviews in software engineering, version 2.3

Yu, 2010, A view about cloud data security from data life cycle, 1

Sabahi, 2011, Cloud computing threats and responses

Grobauer, 2010, Towards incident handling in the cloud: challenges and approaches, 77, 10.1145/1866835.1866850

Wei, 2009, Managing security of virtual machine images in a cloud environment, 91, 10.1145/1655008.1655021

Ristenpart, 2009, Hey, You, get off of my cloud: exploring information leakage in third-party compute clouds, 199, 10.1145/1653662.1653687

Grance, 2011

Kalloniatis, 2005, PriS methodology: incorporating privacy requirements into the system design process

Kavakli, 2006, Incorporating privacy requirements into the system design process: the PriS conceptual framework, vol. 16, No 2, 140

Houmb, 2010, 15(1), 63

2010, “Cloud security and privacy: what is the data life cycle?”

1995

Cannon, 2004

Fischer-Hübner, 2001, vol. 1958

Pfitzmann, 1990, Rechsicherheit trotz Anonymität in offenen digitalen Systemen, Datenschutz Datensicherheit (DuD), 6, 243

Pfitzmann, 1990, 234

Mouratidis, 2006, Secure Tropos: a security-oriented extension of the Tropos methodology

Kalloniatis, 2009, Methods for designing privacy aware information systems: a review, 185

Mulazzani, 2011, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space