A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance.
Kristian BeckersIsabelle CôtéStephan FaßbenderMaritta HeiselStefan HofbauerPublished in: Requir. Eng. (2013)
Keyphrases
- information security
- security issues
- management system
- countermeasures
- computer security
- information systems
- smart card
- data protection
- security requirements
- intrusion detection
- information assurance
- network security
- security level
- security risks
- data security
- risk assessment
- sensitive data
- cyber defense
- security mechanisms
- information security management
- iso iec
- security threats
- privacy concerns
- technical issues
- cloud computing
- e government
- critical infrastructure
- user authentication
- database management systems
- security analysis
- risk analysis
- database
- information loss
- power system
- software engineering
- information technology
- machine learning