Introducing the Information Security Management System in Cloud Computing Environment

@inproceedings{Baniia2015IntroducingTI,
  title={Introducing the Information Security Management System in Cloud Computing Environment},
  author={Raje Bani{\vc}i{\'c}a and John von Neumann},
  year={2015}
}
Numerous organizations coordinate and certify their information security systems according to the Information Security Management System (ISMS) standard. Available Cloud Computing Services (CCSs) include new types of vulnerability (management, virtualization, sprawl, etc.) and differ in management requirements from other computational systems. Establishing a consistent security management framework (SMF) and information security management system (ISMS) in CC environment is a complicated… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-4 of 4 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 17 references

An Application of Proactive Digital Forensic in Cloud Computing Environment, International conference

G. Grubor, A. Njeguš
TELFOR. Belgrade, • 2012
View 5 Excerpts
Highly Influenced

Cloud Computing: Principles and Paradigms

R. Buyya, J. Broberg, A Goscinski
2011
View 5 Excerpts
Highly Influenced

Cyber Forensics in the Cloud, The Newsletter for Information Assurance

S. Zimmerman, D. Glavach
Technology Professionals, • 2011
View 3 Excerpts
Highly Influenced

Computer Security Incident Handling Guide, NIST Special Publication 800-61

P. Cichonski, T. Millar, T. Grance, K. Scarfone
Rev. 2 Recommendations of the National Institute of Standards and Technology, • 2012
View 1 Excerpt

IDS, Digital Universe Study for EMC Corp., SearchStorage.com

T. Erickson
The Security Help Net News, • 2012

Key Challenges in Proactive Threat Management, CEO of Sensage

J. Gottlieb
The Security Help Net News, • 2012
View 3 Excerpts

Lábodi, After Information Security – Before a Paradigm Change (A Complex Enterprise Security Model)

Pál Michelberger, Csaba
Acta Polytechnica Hungarica, Journal of Applied Sciences, • 2012
View 1 Excerpt

Virtualization for Security, Syngress

J. Hoopes
ISBN: 1597493058, • 2012
View 1 Excerpt

Istraga kompjuterskog kriminala

M. Milosavljević, G. Grubor
Univerzitet Singidunum, • 2011
View 1 Excerpt

Similar Papers

Loading similar papers…