Amanote Research

Amanote Research

    RegisterSign In

A Structured Method for Security Requirements Elicitation Concerning the Cloud Computing Domain

International Journal of Secure Software Engineering
doi 10.4018/ijsse.2014040102
Full Text
Open PDF
Abstract

Available in full text

Date

April 1, 2014

Authors
Kristian BeckersIsabelle CôtéLudger GoekeSelim GülerMaritta Heisel
Publisher

IGI Global


Related search

Cloud Computing Security

2016English

Security Requirements Elicitation From Airline Turnaround Processes

Wirtschaftsinformatik
Information Systems
2018English

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

Complex Systems Informatics and Modeling Quarterly
2015English

A Framework for Security Transparency in Cloud Computing

Future Internet
Computer NetworksCommunications
2016English

Cloud Computing and Security

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

A Multi-Level Security Framework for Cloud Computing

International Journal of Recent Trends in Engineering and Research
2018English

Cloud Computing and Security

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

A Research for Cloud Computing Security Risk Assessment

Open Cybernetics and Systemics Journal
ControlSystems EngineeringMathematics
2016English

A New Approach for Data Security in Cloud Computing

International Journal of Innovative Research in Computer and Communication Engineering
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy