1 |
Deyan Chen and Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing", Vol.1, No.1, pp.647-651, 2012
|
2 |
Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing", Vol. 15, No. 2, pp.843-860, 2013
DOI
ScienceOn
|
3 |
Ian Goldberg, David Wagner and Eric Brewer, "Privacy-enhancing technologies for the Internet", Vol., No., pp., IEEE, 1997
|
4 |
Andrew Hiles, "The Complete Guide to IT Service Level Agreements: Aligning IT Service to Business Needs", Rothstein Associates Inc, 2008
|
5 |
I. S. Hayes, "Metrics for IT Outsourcing Service Level Agreement,", Vol., No., pp., Clarity Consulting INC, White Paper, 2004
|
6 |
Harbour, Jerry L., "The Basis of Performance Measurement", Quality Resource, 1997
|
7 |
Kaseye, "SMART SLA", 2012
|
8 |
ITU-T, "Privacy in Cloud Computing", 2012
|
9 |
KPMG, "The cloud takes shape", 2013
|
10 |
CSA "Privacy Level Agreement Outline" 2013
|
11 |
ISO/IEC 27018, "Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors" 2014
|
12 |
D H Park and T S Baek, "Recent Trends and Issues on personal information protection", KIISC REVIE, Vol. 21, No.5 pp.37-44, aug 2011
|
13 |
J D Kim and S H Hwang, "A Study on Critical Success Factors for Implementing Governance of Personal Information Protection", KIISC REVIE, Vol.21, No.5, pp.197-203, aug 2011
|
14 |
H J Suh, M G Choi and S Y Son, "Establishing IT Outsorcing Performance Measurement Framework through the IT BSC", The Korea Society of Information Technology Services, Vol., No.27, pp.301-308, 2003
|
15 |
K C Nam and J H KIm, "A Study of SLA's Maturity Level on Performance", Journal of Information Technology Applications & Management, Vol.14, No.1, pp.1-20, mar 2007
|
16 |
C H Park, "Selection Methodology for SLA Evaluation Factors with End-user Perspective", Korea Information Processing Society, 2007
|
17 |
H J Suh and M L Choi, "Establishing SLA Metrics Selection Framework for Maximizing Operation Efficiency and Satisfaction of IT Outsourcing, Establishing SLA Metrics Selection Framework, Vol.3, No.2, pp.101-115, 2004
|
18 |
KISA, "The study on Providing Personal Information Security",2014
|
19 |
Korea Communication Commission, "SLA guide in Cloud computing", 2011
|
20 |
Ministry of Government Administration and Home Affairs, "Providing Personal Information Security", 2014
|
21 |
TTA KCS.KO-10.2001, "Personal Information Protection Guidelines of Cloud Service Providers", 2014
|