{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:13:30Z","timestamp":1725862410416},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319443409"},{"type":"electronic","value":"9783319443416"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44341-6_4","type":"book-chapter","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T11:05:38Z","timestamp":1470395138000},"page":"48-62","source":"Crossref","is-referenced-by-count":7,"title":["Modelling Secure Cloud Computing Systems from a Security Requirements Perspective"],"prefix":"10.1007","author":[{"given":"Shaun","family":"Shei","sequence":"first","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"Aidan","family":"Delaney","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,6]]},"reference":[{"key":"4_CR1","unstructured":"Chen, Y., Paxson, V., Katz, R.H.: . Whats new about cloud computing security. University of California, Berkeley, Report No. UCB\/EECS-2010-5, 20 January 2010"},{"issue":"1","key":"4_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"LM Vaquero","year":"2008","unstructured":"Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50\u201355 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"4_CR3","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing The business perspective. Decis. Support Syst. 51(1), 176\u2013189 (2011)","journal-title":"Decis. Support Syst."},{"volume-title":"Enterprise Risk Management for Cloud Computing","year":"2012","author":"C Horwath","key":"4_CR4","unstructured":"Horwath, C., Chan, W., Leung, E., Pili, H.: Enterprise Risk Management for Cloud Computing. COSO, Hoboken (2012)"},{"key":"4_CR5","unstructured":"Merrill, T., Kang, T.: Cloud Computing: Is Your Company Weighing Both Benefits & Risks? Ace Group, New York (2014)"},{"issue":"2","key":"4_CR6","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/TCC.2013.10","volume":"1","author":"P Jamshidi","year":"2013","unstructured":"Jamshidi, P., Ahmad, A., Pahl, C.: Cloud migration research: a systematic review. IEEE Trans. Cloud Comput. 1(2), 142\u2013157 (2013)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Kaulgud, V., Sharma, V.S.: Cloud computing security-trends and research directions. In: 2011 IEEE World Congress on Services (SERVICES), pp. 524\u2013531. IEEE, July 2011","DOI":"10.1109\/SERVICES.2011.20"},{"key":"4_CR8","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"6","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 6, 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR9","unstructured":"Almorsy, M., Grundy, J., M\u00fcller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th November 2010"},{"issue":"4","key":"4_CR10","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Grioffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"issue":"2","key":"4_CR11","first-page":"12","volume":"1","author":"SP Ahuja","year":"2012","unstructured":"Ahuja, S.P., Mani, S., Zambrano, J.: A survey of the state of cloud computing in healthcare. Netw. Commun. Technol. 1(2), 12 (2012)","journal-title":"Netw. Commun. Technol."},{"issue":"02","key":"4_CR12","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285\u2013309 (2007)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"1","key":"4_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"4_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"4_CR16","unstructured":"Van Lamsweerde, A.: . Goal-oriented requirements engineering: a guided tour. In: Proceedings of the Fifth IEEE International Symposium on Requirements Engineering, pp. 249\u2013262. IEEE (2001)"},{"key":"4_CR17","first-page":"2011","volume":"11","author":"E Yu","year":"2011","unstructured":"Yu, E.: Modelling strategic relationships for process reengineering. Soc. Model. Requir. Eng. 11, 2011 (2011)","journal-title":"Soc. Model. Requir. Eng."},{"issue":"3","key":"4_CR18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: an agent-oriented software development methodology. Auton. Agents Multi-Agent Syst. 8(3), 203\u2013236 (2004)","journal-title":"Auton. Agents Multi-Agent Syst."},{"issue":"2","key":"4_CR19","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","volume":"63","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561\u2013592 (2013)","journal-title":"J. Supercomput."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Iankoulova, I., Daneva, M.: . Cloud computing security requirements: a systematic review. In: 2012 Sixth International Conference on Research Challenges in Information Science (RCIS), pp. 1\u20137. IEEE, May 2012","DOI":"10.1109\/RCIS.2012.6240421"},{"key":"4_CR21","unstructured":"Li, T., Horkoff, J., Beckers, K., Paja, E., Mylopoulos, J.: . A holistic approach to security attack modeling and analysis. In: Proceedings of the Eighth International i* Workshop (2015)"},{"issue":"2","key":"4_CR22","doi-asserted-by":"crossref","first-page":"20","DOI":"10.4018\/ijsse.2014040102","volume":"5","author":"K Beckers","year":"2014","unstructured":"Beckers, K., et al.: A structured method for security requirements elicitation concerning the cloud computing domain. Int. J. Secur. Softw. Eng. (IJSSE) 5(2), 20\u201343 (2014)","journal-title":"Int. J. Secur. Softw. Eng. (IJSSE)"},{"issue":"1","key":"4_CR23","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","volume":"15","author":"B Fabian","year":"2010","unstructured":"Fabian, B., G\u00fcrses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requir. Eng. 15(1), 7\u201340 (2010)","journal-title":"Requir. Eng."}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44341-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T03:11:12Z","timestamp":1568257872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44341-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319443409","9783319443416"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44341-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}