Proceedings of the 29th Annual ACM Symposium on Applied Computing 2014
DOI: 10.1145/2554850.2554921
|View full text |Cite
|
Sign up to set email alerts
|

A catalog of security requirements patterns for the domain of cloud computing systems

Abstract: Security and privacy concerns are essential in cloud computing scenarios, because cloud customers and end customers have to trust the cloud provider with their critical business data and even their IT infrastructure. In projects these are often addressed late in the software development life-cycle, because these are difficult to elicit in cloud scenarios, due to the large amount of stakeholders and technologies involved. We contribute a catalog of security and privacy requirement patterns that support software… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…In another paper, Beckers et al [46] provided a catalog of security requirement patterns that are relevant for cloud computing. To order these security requirement patterns, different domains were defined.…”
Section: Related Workmentioning
confidence: 99%
“…In another paper, Beckers et al [46] provided a catalog of security requirement patterns that are relevant for cloud computing. To order these security requirement patterns, different domains were defined.…”
Section: Related Workmentioning
confidence: 99%
“…New risks from the reliance on virtualization technologies, which have their own unique risk profiles, have been explored as well [8]. The organization of threat data is improving as technical security concepts have been cataloged to facilitate the identification of secure cloud requirements [9].…”
Section: B Threat Considerationsmentioning
confidence: 99%
“…1. Overview of the pattern-based risk analysis method C. The Security Requirement Patterns In this step, we describe our security requirement patterns (SRP) [4]. The resulting security requirements are related to elements in the CSAP instance.…”
Section: List Of Threatsmentioning
confidence: 99%
“…The creation of security requirements for an asset is simplified by instantiating the relevant security requirement patterns that are referenced by the appropriate Threat Patterns. For more information regarding SRP, we refer to our previous work [4].…”
Section: E Phase 5: Instantiate Security Requirementsmentioning
confidence: 99%
See 1 more Smart Citation