참고문헌
- G. Zhao, "Holistic framework of security management for cloud service providers," in Proceedings of the 10th IEEE International Conference on Industrial Informatics, Beijing, China, 2012, pp. 852-856.
- Z. Guo, M. Song, and J. Song, "A governance model for cloud computing," in Proceedings of the International Conference on Management and Service Science, Wuhan, China, 2010, pp. 1-6.
- J. J. Hwang, H. K. Chuang, Y. C. Hsu, and C. H. Wu, "A business model for cloud computing based on a separate encryption and decryption service," in Proceedings of the International Conference on Information Science and Applications, Jeju, Korea, 2011, pp. 1-7.
- C. C. Lo, Information Security and Its Impact on Business. Hsinchu, Taiwan: National Chiao-Tung University, 2006.
- R. von Rossing, "Applying BMIS to cloud security," in ISSE 2010 Securing Electronic Business Processes, N. Pohlmann, H. Reimer, and W. Schneider, Eds. Berlin, Germany: Vieweg+Teubner Verlag, 2011, pp. 101-112.
- S. Sembhi, "The business model for information security," in RSA Conference Europe, London, UK, 2010.
- D. Meadows (1999). Leverage points: places to intervene in a system [Online]. Available: http://www.donellameadows.org/archives/leverage-points-places-to-intervene-in-a-system/
- Information Systems Audit and Control Association (ISACA) (2010). An introduction to the business model for information security [Online]. Available: http://www.isaca.org/Knowledge-Center/Research/Documents/Introduction-to-the-Business-Model-for-Information-Security_res_Eng_0109.pdf
- Information Systems Audit and Control Association (ISACA) (2010). ISACA issues new comprehensive business model for information security [Online]. Available: http://www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/ISACA-Issues-New-Comprehensive-Business-Model-for-Information-Security.aspx
- R. D. Daniel, "Management information crisis," Harvard Business Review, vol. 39, no. 5, pp. 111-121, 1961.
- J. F. Rockart, "Chief executives define their own data needs," Harvard Business Review, vol. 57, no. 2, pp. 81-93, 1979.
- C. V. Bullen and J. F. Rockart, "A primer on critical success factors," Alfred P. Sloan School of Management, Center for Information Systems Research, Working Paper No. 69, 1981.
- Wikipedia. Critical Success Factor [Online]. Available: http://en.wikipedia.org/wiki/Critical_success_factor#cite_note-4
- R. A. Caralli, "The critical success factor method: establishing a foundation for enterprise security management," Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU/SEI-2004-TR-010, 2004.
- J. S. Wang, C. H. Liu, and G. T. R. Lin, "How to manage information security in cloud computing," in IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, 2011, pp. 1405-1410.
- D. Vohradsky, "Cloud risk: 10 principles and a framework for assessment," ISACA Journal, vol. 5, pp. 31-41, 2012.
- Wikipedia. Lever [Online]. Available: http://en.wikipedia.org/wiki/Lever#cite_note-1
- Cloud Security Alliance (CSA) (2010). Top Threats to Cloud Computing V1.0 [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
- V. Mukhin and A. Volokyta, "Notice of violation of IEEE publication principles security risk analysis for cloud computing systems," in Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Prague, Czech Republic, 2011, pp. 737-742.
- W. A. Jansen, "Cloud hooks: security and privacy issues in cloud computing," in Proceeding of the 44th Hawaii International Conference on System Sciences, Kauai, HI, 2011, pp. 1-10.
- Y. Kadam, "Security issues in cloud computing: a transparent view," International Journal of Computer Science & Emerging Technologies, vol. 2, no. 5, pp. 316-322, 2011.
- J. Brodkin, "Gartner: seven cloud-computing security risks," InfoWorld News [Online]. Available: http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
- S. K. B. Tammaiah, "Cloud computing data security internet and web system2-term paper," unpublished.
- D. Firesmith, "Specifying reusable security requirements," Journal of Object Technology, vol. 3, no. 1, pp, 61-75, 2004. https://doi.org/10.5381/jot.2004.3.1.c6
- Wikipedia. Technology [Online]. Available: http://en.wikipedia.org/wiki/Technology
- Y. Li, "Security & standards in the Cloud: building trust through openness and interoperability in the Cloud," unpublished.
- P. Saripalli and B. Walters, "QUIRC: a quantitative impact and risk assessment framework for cloud security," in Proceedings of the IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 280-288.
피인용 문헌
- Efficient Resource Management Scheme for Storage Processing in Cloud Infrastructure with Internet of Things vol.91, pp.4, 2016, https://doi.org/10.1007/s11277-015-3093-8
- A Generic Software Development Process Refined from Best Practices for Cloud Computing vol.7, pp.5, 2015, https://doi.org/10.3390/su7055321