Requirements Engineering for Security, Privacy and Services in Cloud Environments

被引:0
|
作者
Stefanos Gritzalis
Lin Liu
机构
[1] University of the Aegean,Department of Information and Communication Systems Engineering
[2] Tsinghua University,School of Software
来源
Requirements Engineering | 2013年 / 18卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:297 / 298
页数:1
相关论文
共 50 条
  • [31] A framework to support selection of cloud providers based on security and privacy requirements
    Mouratidis, Haralambos
    Islam, Shareeful
    Kalloniatis, Christos
    Gritzalis, Stefanos
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (09) : 2276 - 2293
  • [32] A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements
    Argyropoulos, Nikolaos
    Shei, Shaun
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Delaney, Aidan
    Fish, Andrew
    Gritzalis, Stefanos
    [J]. PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4827 - 4836
  • [33] Security Chaos Engineering for Cloud Services (Work In Progress)
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Cheng, Feng
    Meinel, Christoph
    [J]. 2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 299 - 301
  • [34] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    Compagna, Luca
    El Khoury, Paul
    Krausova, Alzbeta
    Massacci, Fabio
    Zannone, Nicola
    [J]. ARTIFICIAL INTELLIGENCE AND LAW, 2009, 17 (01) : 1 - 30
  • [35] Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments
    Sun, Dawei
    Chang, Guiran
    Sun, Lina
    Wang, Xingwei
    [J]. CEIS 2011, 2011, 15
  • [36] Automated Identification of Security and Privacy Requirements from Software Engineering Contracts
    Jain, Chirag
    Anish, Preethu Rose
    Ghaisas, Smita
    [J]. 2023 IEEE 31ST INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS, REW, 2023, : 234 - 238
  • [37] Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
    Diamantopoulou, Vasiliki
    Mouratidis, Haralambos
    [J]. INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 382 - 400
  • [38] Enabling Fog Complex Security Services in Mobile Cloud Environments
    Hamdy, Mohamed
    Abbas, Safia
    Hegazy, Doaa
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2021, 60 (04) : 3709 - 3719
  • [39] Leveraging Cloud Services to Spark Innovation, Privacy and Security in Kuwait Hospitals
    Omran, Esraa
    Grandison, Tyrone
    Al Sharhan, Salah
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), 2015, : 65 - 70
  • [40] PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
    Yiannis Verginadis
    Antonis Michalas
    Panagiotis Gouvas
    Gunther Schiefer
    Gerald Hübsch
    Iraklis Paraskakis
    [J]. Journal of Grid Computing, 2017, 15 : 219 - 234