dc.contributor.author | Duncan, Bob | |
dc.contributor.author | Whittington, Mark | |
dc.contributor.author | Jaatun, Martin Gilje | |
dc.contributor.author | Reyes, Alfredo | |
dc.date.accessioned | 2017-03-27T05:47:36Z | |
dc.date.available | 2017-03-27T05:47:36Z | |
dc.date.created | 2017-03-25T18:31:08Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Lecture Notes in Computer Science. 2017, vol 10131, 19-39. | nb_NO |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11250/2435368 | |
dc.description.abstract | In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.title | Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements? | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.source.pagenumber | 19-39 | nb_NO |
dc.source.volume | 10131 | nb_NO |
dc.source.journal | Lecture Notes in Computer Science | nb_NO |
dc.identifier.doi | 10.1007/978-3-319-54380-2_2 | |
dc.identifier.cristin | 1461087 | |
cristin.unitcode | 7401,90,13,0 | |
cristin.unitname | Systemutvikling og sikkerhet | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |