2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) 2015
DOI: 10.1109/espre.2015.7330163
|View full text |Cite
|
Sign up to set email alerts
|

Modelling secure cloud systems based on system requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Despite the emphasis in business processes extracted from legacy source code, the transformation algorithms introduced by this approach can be utilised for the introduction of security to any available process model, newly designed or already existing. This approach will also be integrated in the extraction activity of a migration process of legacy systems to the cloud (SMILE2Cloud) in which we are currently working [37,38].…”
Section: Resultsmentioning
confidence: 99%
“…Despite the emphasis in business processes extracted from legacy source code, the transformation algorithms introduced by this approach can be utilised for the introduction of security to any available process model, newly designed or already existing. This approach will also be integrated in the extraction activity of a migration process of legacy systems to the cloud (SMILE2Cloud) in which we are currently working [37,38].…”
Section: Resultsmentioning
confidence: 99%
“…Ecosystems can also be seen as systems of systems and work on that topic may apply to them. Work on software product line architectures is also relevant [28], as well as work on cloud security requirements [29], but these works do not attempt to model a complete ecosystem.…”
Section: Related Workmentioning
confidence: 99%
“…Thus we need to capture the users security and privacy requirements within the context of their organisational environment. There are many methodologies that can be applied to capture and represent these concepts, but we will focus on adapting a modeldriven security approach for eliciting security and privacy requirements and representing, reasoning and addressing the security and privacy issues and impacts on the users software system in a cloud computing environment [21].…”
Section: Introductionmentioning
confidence: 99%