{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:21:13Z","timestamp":1725682873925},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/espre.2014.6890527","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:52:33Z","timestamp":1410349953000},"page":"42-47","source":"Crossref","is-referenced-by-count":4,"title":["Pattern-based and ISO 27001 compliant risk analysis for cloud systems"],"prefix":"10.1109","author":[{"given":"Azadeh","family":"Alebrahim","sequence":"first","affiliation":[]},{"given":"Denis","family":"Hatebur","sequence":"additional","affiliation":[]},{"given":"Ludger","family":"Goeke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Security Risk Management Guide","year":"2006","key":"19"},{"key":"17","article-title":"Model-driven risk analysis","author":"lund","year":"2010","journal-title":"The CORAS Approach"},{"key":"18","article-title":"The NIST definition of cloud computing","author":"mell","year":"2011","journal-title":"Special Publication 800-145 of the National Institute of Standards and Technology (NIST)"},{"journal-title":"Information Technology -Security Techniques -Code of Practice for Information Security Controls (ISO\/IEC 27002)","year":"2013","key":"15"},{"journal-title":"Information Technology -Security Techniques -Information Security Management Systems -Requirements (ISO\/IEC 27001)","year":"2013","key":"16"},{"journal-title":"Information Technology -Security Techniques -Information Security Management Systems -Requirements (ISO\/IEC 27001)","year":"2005","key":"13"},{"journal-title":"Information Technology -Security Techniques -Information Security Risk Management (ISO\/IEC 27005)","year":"2011","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2000799.2000802"},{"journal-title":"Assessing The Security Risks of Cloud Computing","year":"2008","author":"heiser","key":"12"},{"key":"3","first-page":"1","article-title":"A patternbased method for establishing a cloud-specific information security management system","author":"beckers","year":"2013","journal-title":"Requirements Engineering"},{"key":"2","article-title":"Above the clouds: A berkeley view of cloud computing","author":"armbrust","year":"2009","journal-title":"Technical Report Berkeley"},{"journal-title":"Managing Information Security Risks The OCTAVE (SM) Approach","year":"2002","author":"alberts","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.55"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07452-8_13"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.61"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554921"},{"journal-title":"Cloud Computing -Benefits Risks and Recommendations for Information Security","year":"2009","key":"9"},{"journal-title":"Security Guidance For Critical Areas of Focus In Cloud Computing V3 0","year":"2011","key":"8"}],"event":{"name":"2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","start":{"date-parts":[[2014,8,25]]},"location":"Karlskrona","end":{"date-parts":[[2014,8,25]]}},"container-title":["2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883269\/6890516\/06890527.pdf?arnumber=6890527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T16:41:47Z","timestamp":1580920907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6890527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/espre.2014.6890527","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}