A pattern-based method for establishing a cloud-specific information security management system

@article{Beckers2013APM,
  title={A pattern-based method for establishing a cloud-specific information security management system},
  author={Kristian Beckers and Isabelle C{\^o}t{\'e} and Stephan Fa{\ss}bender and Maritta Heisel and Stefan Hofbauer},
  journal={Requirements Engineering},
  year={2013},
  volume={18},
  pages={343-395}
}
Assembling an information security management system (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation. Assembling an ISMS consists of several difficult tasks, e.g., asset identification, threat and risk analysis and security reasoning. Moreover, the standard demands consideration of laws and regulations, as well as privacy concerns. These demands present multi-disciplinary challenges for… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 17 CITATIONS

Deriving a pattern language syntax for context-patterns

VIEW 11 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers

  • 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND

Pattern and Security Requirements

  • Springer International Publishing
  • 2015