2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.61
|View full text |Cite
|
Sign up to set email alerts
|

Structured Pattern-Based Security Requirements Elicitation for Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(20 citation statements)
references
References 5 publications
0
14
0
Order By: Relevance
“…• A simple method that describes how to conduct a security analysis and to establish a cloud-specific ISMS [3]. • Tool-support for eliciting and analyzing the required informationfor an ISO 27001 certification [5]. • A catalog for Security Requirement Patterns [5].…”
Section: A the Cloudat Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…• A simple method that describes how to conduct a security analysis and to establish a cloud-specific ISMS [3]. • Tool-support for eliciting and analyzing the required informationfor an ISO 27001 certification [5]. • A catalog for Security Requirement Patterns [5].…”
Section: A the Cloudat Frameworkmentioning
confidence: 99%
“…• Tool-support for eliciting and analyzing the required informationfor an ISO 27001 certification [5]. • A catalog for Security Requirement Patterns [5]. …”
Section: A the Cloudat Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, frameworks focusing on the supply-demand relation have been designed [16], and management systems for requirements ensuring QoS have been developed [17]. Moreover, researchers looked into methods for eliciting particular types of requirements, e.g., legal [18] or security [19]. Still, these are only niche recommendations and no comprehensive clear solution exists, addressing the cloud-specific requirements elicitation challenges.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, most existing requirements elicitation methods can only deal with a limited number of stakeholders [22]. The number of potential cloud service consumers may often go beyond what traditional methods can handle [19], and no real solutions addressing this elicitation issue have been developed so far. Market-driven techniques [27], which are usually employed when it is impossible to consider individual consumers, prove to be rather limited in the cloud, due to the lack of specific localized markets.…”
Section: Related Workmentioning
confidence: 99%