Vis enkel innførsel

dc.contributor.authorDuncan, Bob
dc.contributor.authorWhittington, Mark
dc.contributor.authorJaatun, Martin Gilje
dc.contributor.authorReyes, Alfredo
dc.date.accessioned2017-03-27T05:47:36Z
dc.date.available2017-03-27T05:47:36Z
dc.date.created2017-03-25T18:31:08Z
dc.date.issued2017
dc.identifier.citationLecture Notes in Computer Science. 2017, vol 10131, 19-39.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2435368
dc.description.abstractIn this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.nb_NO
dc.language.isoengnb_NO
dc.titleCould the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?nb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.source.pagenumber19-39nb_NO
dc.source.volume10131nb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.doi10.1007/978-3-319-54380-2_2
dc.identifier.cristin1461087
cristin.unitcode7401,90,13,0
cristin.unitnameSystemutvikling og sikkerhet
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel